Business, government agencies and nonprofits all across the country face a critical skills shortage for trained cybersecurity professionals. In South Carolina alone, there are more than 2,000 unfilled job openings while on a national level there are nearly 300,000 more openings than available candidates. Given the high cost of a data breach or ransomware attack, organizations are more than willing to invest in the people they need to strengthen their defenses.
If you’re considering a move into this lucrative and necessary field, South Carolina’s colleges and universities are a great place to start your cybersecurity education. You can start with a two-year degree or move into bachelors and advanced degree programs while immersing yourself in cutting edge research programs.
High school students considering a cybersecurity career will want to take advantage of one of the cyber camps offered around the state. These camps combine hands-on learning with expert advise from South Carolina cybersecurity professionals.
K-12 RESOURCES
CYBERSECURITY EDUCATION AND TRAINING PROVIDERS
Certifications and degrees are powerful tools which can transform the career of a cybersecurity professional or provide an entry way into cybersecurity. Use the map below to find an educator or training center near you and develop your cybersecurity expertise!
The education and training providers in this tool are aggregated from the National Center for Education Statistics’ IPEDS database, as well as the National Centers of Academic Excellence in Cybersecurity (NCAE-C) Program. As we receive additional submissions, we add them to create the most robust tool possible.
CLICK HERE FOR INTERACTIVE MAP AND DEGREE LISTINGS
CYBERSC - South Carolina Cybersecurity Association - www.cybersc.us
SCISCA - Information Systems Audit and Control Association/Midlands Chapter - www.scisaca.org
Upstate ISSA Chapter
ISC2 - Columbia Chapter
ISC2 - Charleston Chapter
An unauthorized individual who attempts to or gains access to an IT system.
When IT professionals purposefully attempt to exploit a website or program’s security vulnerabilities to identify and eliminate weaknesses.
To encrypt or encode plaintext using a computer algorithm.
IT team that emulates cybersecurity hackers in a mock attack.
IT team that defends against cybersecurity attacks in a mock attack.
A cybersecurity challenge focused on exploiting or defending system vulnerabilities.
A cybersecurity competition in which contests must complete challenges from multiple categories or in red team vs. blue team type contests.