Headshot of Michelle Moore, PhD

Michelle Moore, PhD

Academic Director and
Professor of Practice
a podcast mic in the background, foreground reads the 24 best cyber security podcast to listen to in 2025

Computer Science

The 24 Best Cyber Security Podcasts to Listen to in 2025
A chief risk officer oversees an organization's risk management strategies and policies to mitigate potential threats.

Computer Science

What is a Chief Risk Officer? Key Responsibilities & Career Path
two IT professionals work together in a server room holding a laptop

Computer Science

How to Become a Network Security Engineer: Salary & Job Requirement

INCLUDES FREE PROGRAM COMPARISON WORKSHEET!


Get Your Ultimate Evaluation Guide

If an Online Graduate Degree is in Your Future, Analyzing All Your Options Can Help You Make the Best Investment

Choosing an Online Master's Degree: The Ultimate Evaluation Guide
image of a persons hands hovering over a laptop that is sitting on a desk. copy reads "how to become an information security analyst"

Computer Science

How to Become an Information Security Analyst: Career & Salary Guide
woman with dark hair and glasses looks at multiple computer screens with copy over the image saying "your guide to becoming a chief information security officer"

Computer Science

Your Guide to Becoming a Chief Information Security Officer (CISO)
icons-all-interconnected-representing-security-systems-in-front-of-a-blue-background

Technology

Introduction to Security Systems Architecture
man typing on computer suit

Computer Science

Cybersecurity and the Internet of Things (IoT)
A digital illustration depicting a geometric image of the Earth.

Technology

The 23 Top Cybersecurity Websites and Blogs of 2025
man sits in a server room working on cyber security tasks

Technology

Top Paying Cybersecurity Jobs to Watch in 2025
An image of an account login pop-up with fields for a username and password, against a backdrop of glowing lines of code.

Computer Science

How to Land the 9 Best Jobs in Cybersecurity [Includes Salary Data]
10-Reasons-to-Get-Your-Masters-Degree-in-Cyber-Security

Technology

10 Reasons Why a Cyber Security Degree is Worth It
close-up-of-a-person-in-a-suit-using-their-cell-phone.-Coming-out-of-their-cell-phone-is-a-graphic-showing-"cybersecurity".

Technology

23 Best Network Forensic Tools and Software
A man is typing at a computer behind the words "Complete Guide to Cybersecurity Coding."

Technology

A Complete Guide to Cybersecurity Coding
The words "Cybersecutity Master's Degrees: Compared" are in the center of an illustration that shows six small, computer-related graphics including a fingerprint and a lock.

Technology

10 Types of Cybersecurity Masters Degrees Compared (+ Specializations)
security-software-developer-career-&-salary-guide

Technology

Security Software Developer [Career and Salary Guide]
a-mans-hands-are-typing-on-a-laptop-sitting-on-a-desk,-overlayed-by-the-words-"cybersecurity-versus-information-technology-degrees"

Computer Science

Cybersecurity vs. Information Technology Degrees
cybersecurity-vs-computer-science-featured-image

Computer Science

Your Guide to Cybersecurity vs. Computer Science Degrees 
cyber-security-incident-response

Computer Science

Your Guide to Cyber Incident Response
cybersecurity-bootcamps

Computer Science

Cybersecurity Bootcamps vs. Degrees
graphic depicting a man with black hair and sunglasses holding a laptop with a blue background

Technology

Guide to Cybersecurity Internships 2025: Skills, Growth & Success