Cyber Defense

Cyber Defense Concentration

In today’s digital age, cyber security challenges are a daily concern for both public and private sector organizations. The Cyber Defense Concentration at the College of Coastal Georgia offers a unique opportunity to combine your interest in criminal justice with your passion for technology. This program prepares you for a rewarding career in cyber defense, equipping you with the skills to protect critical infrastructure and data from cyber threats.

Why study Cyber Defense at Coastal Georgia?

The Cyber Defense concentration at Coastal is unique because it allows you to combine your interest in criminal justice and investigation with your talent in information technology. Those who work in the field of cyber defense can make an impact by helping keep governments, businesses, and even our nation’s critical infrastructure safe and functioning.

“The college students are getting real-world training that can’t be duplicated in a classroom environment,” said Assistant Professor of Cyber Defense, Dr. Nelbert “Doc” St. Clair.

What will I learn?

Coastal Georgia students benefit by participating in a required internship within the information technology field, providing real world experience. As part of the learning process, students enter cybersecurity competitions, also known as CTF (capture the flag). This gamified approach helps students learn at their own pace while competing against other students. Our students also benefit from research initiatives – attending cybersecurity conferences and participating in community service projects.

What can I do when I graduate?


Data Security
  • Protecting and maintaining the integrity of businesses, customers, and other data
Application Security
  • Ensuring software and other applications cannot be hacked, compromised, accessed or disabled without proper authorization

Network Security
  • Protecting network infrastructure and software from unauthorized access
Operational Security
  • Day-to-day monitoring and security management
Identity and Access Management (IAM)
  • Authenticating users and authorizing them to access specific applications, data, and other systems
Privileged Access Management (PAM)
  • Controlling and monitoring privileged access for users, accounts, applications, and other system assets
Vulnerability Management (VM)
  • Proactive identification (such as scanning) and resolution (such as patching, systems hardening, implementing new solutions, etc.) of potential threats and vulnerabilities in the IT ecosystem
Enterprise Mobility Management (EMM)
  • This can include mobile device management (MDM) and other processes and technologies for securely enabling a mobile workforce
Security Training
  • Teaching employees and other users to identify and appropriately deal with common security issues like phishing, malware, or social engineering.
Cyber Defense Concentration

A group of Cyber Defense students spent their Thanksgiving holiday installing upgrades on computers at the Boys and Girls Club.

READ THE STORY