Return To Campus Plan
Lipscomb University's comprehensive plan to return to campus.Learn More
Protecting confidential information is a business obligation, and often an ethical and legal one. Governments, corporations, financial institutions, hospitals and private businesses all amass confidential information. That information is all about their employees and customers, products, research — and financial status. Our experienced faculty will guide you to success. On graduation day, you'll be ready to begin your career in information security.
General education requirement (38 hours)
Specific courses required:
Required courses for the major area (79-81 hours)
CS 3333 - Mobile and Distributed Computing Systems
GD 3253 - Game Development I
CS 3243 - Mobile Device Programming
IT 3333 - Network Administration
IT 3343 - Database Administration
**A general business minor is automatically satisfied by the information security major.
Become more competitive in the job market with an internship related to your interests. You’ll gain experience and boost your exposure. An internship will also help you learn whether you’ve chosen a career you’ll enjoy.
With a top-tier university education on your resume, you’ll be in high demand, whether you choose to launch your career or begin graduate school. Most of our programs have a placement rate of at least 90 percent within six months of graduation.
Learn from award-winning, experienced faculty who actually care about you. Our small class sizes allow us to get to know you personally. We lead an approachable community within our respective programs. Our faculty connections are the experts on their subject matter, too.
Ken Mayer Jr. is an Assistant Professor in Cybersecurity and IT. Previously, he came from private industry working for several Fortune 500 companies including, Dell Inc., Mercedes-Benz North America, and...Learn More
Chris Simmons is an Assistant Professor in the College of Computing and Technology. He obtained his Bachelor's degree from Tennessee State University, followed by a Master's degree in Information Technology...Learn More
Alan Cantrell is an Instructor in the College of Computing and Technology at Lipscomb University. He is a Director of IT Service Management in the Infrastructure & Security department at...Learn More
Information security analysts plan and carry out security measures to protect an organization’s computer networks and systems. Their responsibilities are continually expanding as the number of cyberattacks increases.
Computer and information research scientists invent and design new approaches to computing technology and find innovative uses for existing technology. They study and solve complex problems in computing for business, medicine, science, and other fields.
Private detectives and investigators search for information about legal, financial, and personal matters. They offer many services, such as verifying people’s backgrounds and statements, finding missing persons, and investigating computer crimes.