dcsimg

Information Assurance Training

Information assurance (cyber security) continues to be one of the most valued and critical elements of every individual's and organization's digital assets. Currently, our personal information seems to be under constant attack; everything from the photos on our smartphones, to the credit card numbers kept on file by the merchants we buy from, to the income tax and medical records stored by our governments, is all being sought out by criminals looking to capture and exploit this data.

Cyber security professionals are responsible for designing, implementing, and maintaining secure countermeasures against hacking attacks and exploits. They create secure networks and data storage solutions, implement fixes to address new vulnerabilities, and investigate IT security-related crimes when they occur.

Hacking Counter Hacking
Ready to start pursuing your tech degree?
Search our school directory to find the right program for you.

What does a network security administrator do?

Network security admins do much of their work with devices including routers, switches and servers, but the job also has a human element. The design and implementation of policies and training programs can help keep fellow employees informed of proper network security practices, which contributes immensely to an organization's overall security.

Staying informed about the newest solutions, threats and advisories known to the industry is a large part of the job of a security admin. In order to remain on the cutting edge, network security administrators often travel to industry conferences or events hosted by professional associations in the information security field. A fair amount of technical reading is usually required as well.

Learn more about network security administrators

Return

What does a network security specialist do?

Network security specialists use software programs and analysis techniques to assess data networks and determine the right ways to handle or prevent security threats.

Monitoring software helps network security specialists stay on top of the type and amount of usage taking place on enterprise network systems. The growing reliance on client-server applications and the demand for secure business intranet systems make these monitoring tasks increasingly important, especially on wireless and virtual networks.

Network security specialists also deploy, maintain and occasionally update the suite of network management and directory services software that watches over their systems' data lines, and communicate with IT managers regularly about system issues and strategies.

Learn more about network security specialists

Return

What does a computer security specialist do?

Computer security specialists configure access to computer systems as well as planning and coordinating information security protocols.

The role of a security specialist usually includes some network monitoring tasks and the installation of security software on a company's computer terminals. Performing risk assessments, developing effective system-wide security plans and staying informed about the latest trends in computer virus and malware deployment are also principal components of the position.

In the event of an attempted breach or network attack, these specialists are on the front lines of response and defense. Sometimes an attack includes malicious code to be rooted out and removed or quarantined, and quick action can help prevent intruders from viewing protected information or sabotaging the system. Information must also be gathered on breach events in order to help protect the system against future intrusion.

There may also be a training element to the position. Security specialists often help instruct employees on basic preventative measures in cyber security. Senior members of an IT security team are frequently counted on to educate new recruits on the particulars of a company's security setup.

Learn more about computer security specialists

Return

What does a IT security analyst do?

An IT security analyst examines information systems and determines the best security solution for each system. Security analysts are also sometimes referred to as security architects. They design and implement solutions made up of security protocols, hardware devices and software components. These security solutions are based on the requirements discovered during the analyst's examination of an organization. Security analysts often test existing security systems in order to find potential vulnerabilities. They may also assist with the creation of internal standard operating procedures (SOPs) that support and reinforce system security.

A key proficiency required by every security analyst is an ability to communicate with software developers, corporate management, legal staff and other colleagues to build their awareness of any holes in the company's incoming and outgoing data network connections. Breaches in security are inevitable in a connected world; threats could just as easily come from within the company as from a remote source.

Knowing what can destroy a network begins with knowing what builds a network. A basic familiarity with information architecture is essential. Recognizing not only code, but also inconsistent patterns in code behavior, paves the way to tracing faults and responsibility. Technical ability, however, counts for nothing if information is not properly communicated to those not schooled in all things technical. Finally, a security analyst must be prepared to draw upon historic experience, recognize available resources and initiate responses that prevent incident repetitions.

Learn more about IT security analysts

Return

Ready to start pursuing your tech degree?
Search our school directory to find the right program for you.

Cyber security education in-depth

Employers of IT security professionals usually require potential employees to have at least a Bachelor's degree in a computer technology field. Some employers will accept a bachelor's in computer science or computer engineering. However, because of the increasing importance of (and media focus placed on) IT security, many employers now prefer a specialized degree such as a B.S. in information systems security, or a variation of this (e.g., IT -- Security; Information Security; Information Assurance, etc.).

There are also several associate's degrees in IT security available from technical schools, junior colleges and other schools. These degrees often require less time to earn than a bachelor's degree, and can help a candidate earn an entry-level position as an IT security professional, or enable them to start their own business as an IT security consultant.

For those looking to enter the industry at a higher level or to improve their chances of advancement, there are a number of universities and colleges that offer a master's degree in IT security. These post-graduate programs often include more advanced business management education in order to give graduates an advantage when it comes to advancing into leadership positions offered by employers.

Earning a cyber security degree

As described by the U.S. Bureau of Labor Statistics (BLS), information security analysts plan, implement, upgrade and monitor security measures for the protection of computer networks and data. They ensure that appropriate security controls are in place to safeguard digital files and vital electronic infrastructure, and respond to computer security breaches and viruses. Security professionals may also gather the evidence needed to prosecute cyber-crimes.

Most employers of computer security specialists require potential employees hold at least a bachelor's degree in computer science or a related field. However, because of the increasing complexity of online attacks, many employers may prefer a specialized degree such as a B.S. in information cyber security or advanced information security training, such as those leading to CISSP or CEH certifications. While in school, students can expect to take courses covering the following topics:

  • Network monitoring software
  • Authentication server software
  • Transaction security and virus protection software
  • Communications and media
  • Business administration and management
  • Telecommunications

Ensuring security for mobile and wireless devices is a particularly hot topic in the wake of the consumerization of IT and the flood of users bringing their own iPhones, Android phones and iPads into the enterprise space. As a company's list of approved or managed platforms increases, so do its security responsibilities.

Return

Information Systems Security Training

Information systems security professionals have watched their jobs weather radical changes over the past two decades. When businesses first connected their offices to the Internet, information security rarely showed up on departmental budgets until companies faced threats from hackers, criminals or bad public relations. According to a 2015 PricewaterhouseCoopers survey, companies have ramped up their IT security spending to meet global compliance standards, usually under client or government pressure.

Ideal candidates for information systems security training

According to PricewaterhouseCoopers, the top concerns of CIOs and other information systems managers are "breaches" and "benches" -- data invasions and people on call to deal with them. Thanks to enhanced intrusion detection and more rigorous logging, the reported number of information technology system breaches at large companies has risen sharply since 2008. Though the overall number of security incidents at a typical company has declined during the same time, more businesses than ever understand the need for dedicated IT security policies and personnel.

Meanwhile, current and former employees cause roughly half of the security breaches reported in the PwC survey. Those results point to a need for stronger information systems security training throughout most organizations. Learning baseline IT security measures can build a bench of talent that managers can draw upon for future, dedicated positions. However, the PwC survey indicates that many employers would prefer to build security training into the professional development programs of most workers.

Ready to start pursuing your tech degree?
Search our school directory to find the right program for you.

Ideally, information systems security training programs blend classroom learning with lab work, sometimes enabling students to gain credit for projects carried out for their employers. Aspiring IT professionals can use information systems security courses to gain a competitive advantage in the job market, especially if they combine technical expertise with subject matter knowledge from earlier in their careers. Professionals should expect ongoing security training to become an essential element of their professional development.

Return

Cyber Security Training

Numbers don't lie: Even though economic woes have slowed growth in many different sectors over the past few years, figures prove that opportunities for those with cyber security training are on the rise.

Data from the BLS shows employment for network and computer systems administrators is expected to grow much faster than average over the next decade, with excellent prospects for those with security skills. Not only can the right cyber security training help one get a job; it can also boost paychecks and earning potential.

Why is cyber security training important?

Security is a hot topic, and it's easy to see why. Today people from all walks of life the Internet and computers for all sorts of tasks: Communication, including email, SMS and MMS, cellphones and more; online business like shopping, banking and bill payment; management of medical records and information; entertainment, including downloading music, movies and books; research and more.

All of these transactions involve sharing some kind of personal information, and it's scary to think about the consequences of a security breach in any case. Cyber security, according to the Department of Homeland Security's U.S. Computer Response Readiness Team (US-CERT), involves protecting that information by "preventing, detecting and responding to attacks."

Simply put, computer users rely on professionals with cyber security training to keep their personal information secure.

What are the training options?

Professionals interested in cyber security courses and training will find there are many options. The Department of Homeland Security recommends cyber security training programs teach professionals how to detect and stop threats including:

  • Hacker and intruder attacks
  • Malicious code, including viruses and worms
  • Vulnerability in software and coding

Return

Information Assurance Training

Information assurance describes the wide range of standards, skills, knowledge and practices necessary to maintain healthy data networks. Students can find training for information assurance at several different types of institutions, including online colleges, traditional universities, government organizations and Army Signal Corps training centers.

With the elevated level of security necessary to protect the sensitive intelligence networks used by the military and government agencies, professionals with appropriate training for information assurance tasks may find themselves in high demand for state and federal jobs.

Who is best suited for information assurance training?

Individuals with a strong background in computer science stand to fare well in this field. Professionals with experience or interest in network architecture, forensic science, risk management and systems engineering might be better suited for information assurance careers than those without it.

Information assurance typically requires a sharp analytical mind and the ability to spot small inconsistencies in complex systems. Good communication skills can also help, since a large number of human users are likely to interact with the system. Also, because information assurance training covers some areas outside of general data security, experience with domains such as interface design can be a plus.

What skills does information assurance training cover?

Here are a few of the duties of an information assurance professional, according to the Committee on National Security Systems in their National Information Assurance Training Standard for Information Systems Security Officers:

  • Ensure the information system is maintained and operated in accordance with established policies
  • Enforce appropriate security policies and safeguards to personnel with access to the system
  • Initiate protective or corrective measures when necessary
  • Evaluate known vulnerabilities and determine if additional security measures must be added
  • Analyze cyber security policies and technologies and process the training requirements necessary to operate the system at a desired assurance level

Return

What training does it take to become a network security administrator?

Like many other administrative positions in the IT market, network security administrator jobs typically require a four-year bachelor's degree. Common subjects of study for network security administrators include computer science, computer engineering, software development and management information systems (MIS). Degrees earned in other fields may satisfy the educational requirement, if a candidate possesses an appropriate level of knowledge and skill for the position.

Professional certification courses and exams can help round out the qualifications of an aspiring network security administrator. Here are just a few of the certification paths available:

  • CompTIA Security+
  • CheckPoint Certified Security Administrator (CCSA)
  • Cisco Certified Network Associate (CCNA)
  • Cisco Certified Network Professional (CCNP)
  • Information Systems Security (INFOSEC) Professional
  • Certified Information Systems Security Professional (CISSP)

Certifications available from solutions vendors like Cisco tend to focus on the finer points of particular hardware and software solutions. Vendor-neutral certifications, from organizations such as CompTIA and (ISC)², often concentrate on the big picture of best practices and how to integrate various solutions into a comprehensive information security system.

Learn more about network system admins

Return

What training does it take to become a network security specialist?

The Occupational Information Network reports 88 percent of information security specialist positions are held by individuals with post-secondary degrees. About 65 percent of workers hold bachelor's degrees and 23 percent had completed graduate work. The report also shows that 11 of the remaining 12 percent had attended some college or university work.

Several certifications also exist to help broaden and solidify the skillsets of network security professionals. One source for these certifications is the International Information Systems Security Certification Consortium, or (ISC)². Of the several credentials offered by (ISC)², the most relevant to network security specialists are Systems Security Certified Practitioner (SSCP), which requires one year of experience in a data security field, and Certified Information Systems Security Professional (CISSP), which is an upper-level certification and usually requires five years' work experience before beginning the certification process.

Learn more about network security specialists

Return

What training or certification does it take to become a computer security specialist?

Formal education isn't typically required by employers, but a degree in computer science, information security or a related field can boost a candidate's chances. Professional certifications, such as Certified Information Systems Security Professional (CISSP), Systems Security Certified Practitioner (SSCP) and Certified Authorization Professional (CAP), can also serve to demonstrate information security expertise to potential employers.

The demands of the IT world are changing every day, and computer security specialists who continue to train and study the details and dynamics of their field tend to rise to the top of the heap. Information security is an ongoing fight, and although training is certainly useful to someone trying to become a computer security specialist, it can be especially useful to an established professional who wants to stay on top.

Learn more about computer security specialists

Return

What training or certification does it take to become an information security analyst?

Security professionals typically have at least a bachelor's degree, although a few have only some technical education. Specific courses are available for fast-growing fields and emerging security issues, for example, configuration management, security information and event management, storage security, and wireless security solutions. Basic courses focus on subjects such as ethical hacking, penetration testing, incident response, computer forensics and reverse engineering.

Some professionals working in the field do not hold an actual information security degree. That said, training and certification are often required. The nature of security is fast-changing; therefore training may have a short shelf life. Training in basics like Microsoft Windows, programming and network issues is only the beginning for most security analysts.

Learn more about information security analyst

Return

Ready to start pursuing your tech degree?
Search our school directory to find the right program for you.

What is the job outlook for network security administrators?

The IT admin sector is projected to see growth in the near future. Growth is expected to be much faster than the national average for all occupations, and job prospects should be excellent for candidates with the right experience and training.

Job TitleProjected 2012-2022 Growth
Information Security Analysts-U.S.36.5
*This data is sourced from the 2013 BLS employment report (BLS.gov)

What sort of salary can a network security administrator expect?

Salary expectations for network security administrators can vary significantly based on responsibility level and network size:

*This data is sourced from the 2013 BLS employment report (BLS.gov)

Get matched to an IT school that is right for your needs

Return

What is the job outlook for network security specialists?

According to the BLS, the career super sector that contains network security specialists is projected to grow:

Job TitleProjected 2012-2022 Growth
Network and Computer Systems Administrators-U.S.11.7
*This data is sourced from the 2013 BLS employment report (BLS.gov)

What sort of salary can a network security specialist expect?

The industry in which a network security specialist is employed can also influence salary expectations. The BLS counts network security specialists among network and computer systems administrators:

*This data is sourced from the 2013 BLS employment report (BLS.gov)

Get matched to an IT school that is right for your needs

Return

What is the job outlook for computer security specialists?

As businesses come to rely increasingly on new technologies, computer security specialists are enjoying greater and greater demand in the career marketplace:

Job TitleProjected 2012-2022 Growth
Computer Network Architects-U.S.14.6
Web Developers-U.S.20.1
*This data is sourced from the 2013 BLS employment report (BLS.gov)

What sort of salary can a computer support specialist expect?

The broad salary range among computer security specialist jobs may also be due in part to the influence of geographical location and industry standards on wage expectations:

Job TitleBottom 10% Annual WageAnnual Median WageTop 10% Annual Wage
Computer Network Architects-U.S.5516098430150460
Web Developers-U.S.3379063490112680
*This data is sourced from the 2013 BLS employment report (BLS.gov)

Get matched to an IT school that is right for your needs

Return

What is the job outlook for information security analysts?

Data has become the lifeblood of corporate vitality, and any reversal of cyber fortune can impugn the company reputation, or destroy company resources. Consequently, there is a high demand for technically schooled and certified security analysts:

Job TitleProjected 2012-2022 Growth
Information Security Analysts-U.S.36.5
*This data is sourced from the 2013 BLS employment report (BLS.gov)

What's a typical information security analyst salary?

The BLS groups information security analysts with Web developers and computer network architects. Here are the median salary numbers for that category of IT professionals:

*This data is sourced from the 2013 BLS employment report (BLS.gov)

Get matched to an IT school that is right for your needs

Return

IT security professionals looking to add credentials to their resume should consider earning one or more IT security certifications. There are a number of security certifications available from a wide variety of vendors and industry associations, including the following:

  • Microsoft
  • Cisco
  • ISC2
  • CompTIA
  • Global Information Assurance Certification (GIAC)
  • Shared Assessments

Return

Ready to start pursuing your tech degree?
Search our school directory to find the right program for you.

Sources
"15-1152.00 – Computer Network Support Specialists," O*NET OnLine, 2015, https://www.onetonline.org/link/summary/15-1152.00
"15-112.00 – Information Security Analysts," O*NET OnLine, 2015, https://www.onetonline.org/link/summary/15-1122.00
Committee on National Security Systems, 2013, https://www.cnss.gov/CNSS/index.cfm
"Network and Computer Systems Administrators," U.S. Bureau of Labor Statistics, Occupational Outlook Handbook, 2014, http://www.bls.gov/ooh/computer-and-information-technology/network-and-computer-systems-administrators.htm
"Information Security Analysts," U.S. Bureau of Labor Statistics, Occupational Outlook Handbook, 2014, http://www.bls.gov/ooh/computer-and-information-technology/information-security-analysts.htm
United States Computer Emergency Readiness Team, 2015, https://www.us-cert.gov/
"Global Information Security Survey 2015: Key Findings by Region," PricewaterhouseCoopers, 2015, http://www.pwc.com/gx/en/consulting-services/information-security-survey/territory-focus.jhtml

Information Assurance Training

Searching Searching ...

Matching School Ads
3 Program(s) Found
  • Recognized in the first Best for Vets: Business Schools list in Military Times Edge magazine’s 2013 “Best for Vets” edition.
  • Offers MUSE (My Unique Student Experience), a content delivery system that gives students the option to watch, view, read or listen to required course materials.
  • Allows students to complete courses at whatever pace they want.
  • A DANTES-affiliated university and member of the Service Members Opportunity Colleges.
  • Offers IntelliPath, a proprietary learning technology that lets students learn at their own pace.
Good for Working Adults
  • Online Courses
  • Flexible Scheduling
  • Financial Aid
  • Transferable Credits
5 Program(s) Found
University of Phoenix , Online (campus option available)
  • Phoenix Career Services™ help students find careers that match their interests & map out a personalized career plan.
  • Mentorships & networking opportunities available through Alumni Association of 800,000+ graduates.
  • Flexible start date and class schedules.
  • Locations nationwide and online options.
  • Offers special military rates and special advisors who have a military background.
  • Students can earn credits for applicable military training and education.
Good for Working Adults
  • Online Courses
  • Flexible Scheduling
  • Financial Aid
5 Program(s) Found
  • 95% alumni satisfaction rate.
  • Currently holds more than 500 professional alliances, including 19 of the top Fortune 100 companies.
  • Courses are taught by expert faculty, with 86% of professors possessing a doctoral degree.
  • Offers credit for prior experience and learning, as well as scholarships, accelerated programs, and several other ways to help reduce tuition costs.
  • Regionally accredited by the Higher Learning Commission (HLC) of the North Central Association (NCA).
Show more [+]
  • Online Courses
  • Financial Aid
  • Transferable Credits
5 Program(s) Found
  • Online school designated as a 2015 Military Friendly School by Victory Media.
  • Commited more than $60 million in tuition savings in 2015 through scholarships.
  • Active-duty military, veterans, and Veteran’s Administration employees can save 15% on tuition.
  • Offers 24/7 student services, including financial aid help, course registration, and career counseling.
  • Regionally accredited by the Higher Learning Commission (HLC) of the North Central Association (NCA).
Show more [+]
  • Online Courses
  • Financial Aid
  • Transferable Credits
2 Program(s) Found
  • Students who qualify may apply for the Opportunity Scholarship, which can help lower education costs.
  • Offers career-focused, degree programs to over 70,000 students at over 140 ITT Technical Institutes in 35 states.
  • Classes are offered year-round, with day and evening course options.
  • Online courses can be accessed from anywhere, 24 hours a day.
  • Nationally accredited by the Accrediting Council for Independent Colleges and Schools.
Show more [+]
  • Financial Aid
  • Transferable Credits
4 Program(s) Found
  • Ranked among the Best Online Bachelor’s Programs by U.S. News and World Report in 2015.
  • Ranked among the Best Online MBA Programs by U.S. News and World Report in 2015.
  • Founded in 1890, it has a campus in Waterbury, CT and offers online degree program in eight-week modules, six times a year.
  • About 800 students are enrolled at the main campus, and about half of them commute.
  • Online courses make it possible for students to earn a bachelor’s degree in as little as 18 months and a master’s degree in 14-24 months.
Show more [+]
Good for Working Adults
  • Online Courses
  • Flexible Scheduling
  • Accelerated Programs
  • Financial Aid
  • Transferable Credits
1 Program(s) Found
  • Ranked among the Best Online Bachelor's Programs in 2014 by U.S. News & World Report.
  • Implements a one-to-one teaching model, partnering one student with one faculty member in each course.
  • 100% of faculty members hold doctoral degrees.
  • No physical residency requirements, allowing students to pursue their degree online.
  • Committed to innovation, diversity, excellence, and accountability since its founding in 1996.
  • Offers several programs in business, education, psychology, and more.
Show more [+]
  • Online Courses
  • Financial Aid
  • Transferable Credits
5 Program(s) Found
  • Ranked among top Regional Universities in the South by U.S. News and World Report in 2015.
  • Ranked 37th among the Best Colleges for Veterans by U.S. News and World Report in 2015.
  • Stands as the largest private, nonprofit university in the nation with 100,000+ students.
  • Offers over 230 programs online, from the certificate to the doctoral level.
  • Has a student-faculty ratio of 25:1, and 42.3% of its classes have fewer than 20 students.
Show more [+]
  • Accredited
  • Online Courses
  • Financial Aid
  • Transferable Credits
5 Program(s) Found
ABCO Technology , Los Angeles
  • An accredited computer training academy preparing students to enter the IT industry as Network Engineers, Software Engineers, Web Apps Developer, Website Designers, Programmers, Database Administrators since 2000.
  • Holds A+ certification from CompTIA.
  • Located in Los Angeles, approximately 10 minutes away from LAX.
  • Flexible class schedules offered during day times, evenings and weekends.
  • Helping students start a career in technology within 3 - 9 months.
  • Educates with the mission to serve the needs of the local community and graduates by matching opportunities to skills.
  • Military friendly school.
Show more [+]
  • Financial Aid
1 Program(s) Found
  • A private, non-profit school offering career-oriented degree programs in San Diego County, CA since 1978.
  • Gives students a new laptop that they can keep as a gift upon graduation.
  • Offers Fresh Start Scholarships to students who qualify.
  • Teaches with the mission to, "educate people for rewarding careers.”
  • Lets students choose when their program begins thanks to monthly start dates.
  • Offers programs at 3 locations and online.
Show more [+]
Good for Working Adults
  • Accredited
  • Flexible Scheduling
  • Accelerated Programs
  • Financial Aid
1 Program(s) Found
  • The nation’s first private college to offer civil engineering instruction and one of the first institutions to receive designation as an NSA Center of Excellence in Information Security Education.
  • Founded in 1819 as the nation's first military college.
  • Structures online courses so that students take a single course at a time.
  • Offers a 24/7 help desk ready to assist students with any questions they have.
Show more [+]
  • Accredited
  • Online Courses
  • Financial Aid
  • Transferable Credits
1 Program(s) Found
  • Each year since 2004, The Princeton Review has included California University in its Best in the Northeast listing, recognizing Cal U as one of the best regional universities in the northeastern United States.
  • Ranked #35 in Best Online Graduate Education Programs by U.S. News and World Report in 2015.
  • Offers private school amenities at a public school cost.
  • Grants students in its Global Online program the same diploma as graduates from Cal U’s traditional degree programs.
  • Has an student-to-teacher ratio of 20:1.
Show more [+]
  • Accredited
  • Online Courses
  • Accelerated Programs
  • Financial Aid
  • Transferable Credits
2 Program(s) Found
  • Has students attend one four-week class at a time and take their final exam before moving on to their next class.
  • Offers 24/7 online tech support, with a typical response time of 4 hours or less.
  • Has online help centers that offer assistance with writing, statistics, medical assisting, and more.
  • Provides job placement assistance to all its students and alumni.
  • Researches trends for growing fields to tailor a more effective curriculum.
Show more [+]
Good for Working Adults
  • Accredited
  • Online Courses
  • Flexible Scheduling
  • Financial Aid
  • Transferable Credits
5 Program(s) Found
  • Gives students the option to enroll at any time and begin studies in the fall, spring, or summer.
  • Has an average freshman retention rate of 77.3 percent.
  • Ranked #39 in Best Colleges for Veterans by U.S. News and World Reports
  • Has more than 50,000 alumni including several astronauts, CEOs, and 32 generals.
  • Offers a special tuition rate for active duty, selected reserves, National Guard service members and their spouses.
Show more [+]
  • Online Courses
1 Program(s) Found
UEI College , Riverside
  • Dedicated to providing  career training since 1975.
  • Has 13 campus locations in Southern California and a campus in Morrow, GA.
  • Provides flexible class times including weekends.
  • Offers curriculum that ranges from 8 month diploma programs to 16-month Associate of Applied Science degree programs.
  • Has admissions professionals available to help students decide which diploma or degree program they should pursue.
  • Gives job placement assistance strengthened by relationships with local employers.
Show more [+]
Good for Working Adults
  • Accredited
  • Flexible Scheduling
  • Financial Aid
2 Program(s) Found
  • Ranked among the 2015 Best Online Graduate Education Programs by U.S. News & World Report.
  • Awarded 21 institutional scholarships in 2013, totaling over $76,000 in tuition.
  • Offers several certificate programs where students can earn credits without committing to a full degree program.
  • Accredited by the Higher Learning Commission (HLC) of the North Central Association (NCA).
  • Part of the Colorado State University System.
Show more [+]
  • Online Courses
  • Financial Aid
  • Transferable Credits
1 Program(s) Found
  • Designated as a 2015 Military Friendly® School by Victory Media, publishers of G.I. Jobs®.
  • Each program is designed to instill the knowledge, ethical values, and interpersonal skills of professional practice and to foster values of social responsibility.
  • Offers several flexible learning options, including a blended format that combines campus and online learning.
  • Several scholarship opportunities are available for students who qualify.
  • Features a competency-based MBA program that allows students to test out of subjects based on prior professional experience.
Show more [+]
Good for Working Adults
  • Online Courses
  • Flexible Scheduling
  • Financial Aid
  • Transferable Credits
1 Program(s) Found
Unitek College , San Jose
  • Approved by the Better Business Bureau (BBB) with an A+ rating since 2010.
  • Established its main campus in Fremont, California, with satellite campuses in San Jose and Sacramento.
  • Offers programs in medical assisting, pharmacy technology, vocational nursing, and more.
  • Accredited by the ACCSC, with approval from the California Board of Vocational Nursing and Psychiatric Technicians and the Board of Registered Nursing.
Show more [+]
Good for Working Adults
  • Flexible Scheduling
  • Financial Aid
  • Transferable Credits
2 Program(s) Found
  • Ranked 7th for “Best Value” among Regional Universities in the Midwest by U.S. News and World Report in 2015.
  • Ranked among top Regional Universities in the Midwest by U.S. News and World Report in 2015.
  • An evangelical Christian university committed to liberal arts and professional education.
  • Offers more than 80 majors offered covering everything from Business and Communications to Theology and Ministry.
Show more [+]
  • Accredited
  • Online Courses
  • Accelerated Programs
  • Financial Aid
  • Transferable Credits
1 Program(s) Found
  • Dedicated to providing a hands-on, career-focused education since 1953.
  • Offers classes online, as well as at 14 campuses across California, Colorado, Georgia, Illinois and Virginia.
  • Develops curriculum with input from employers, subject matter experts.
  • Has small class sizes to promote one-on-one, student-teacher interaction.
  • Makes no-cost tutoring available in every subject to every enrolled student.
Show more [+]
  • Accredited
  • Accelerated Programs
  • Financial Aid
Table of Contents

Ready to Advance your Career
Enroll Now
Connect with Schools & Programs