By Steve Smith
The information presented here is true and accurate as of the date of publication. DeVry’s programmatic offerings and their accreditations are subject to change. Please refer to the current academic catalog for details.
April 20, 2023
The information presented here is true and accurate as of the date of publication. DeVry’s programmatic offerings and their accreditations are subject to change. Please refer to the current academic catalog for details.
April 20, 2023
Businesses of all sizes depend on secure information systems for the processing and storage of sensitive data. To help keep these systems secure, companies employ cyber security professionals and often work with consultants who have specific information security skills. In this article, we’ll outline how to become a cyber security consultant, explore some of their duties and the skills needed to pursue this occupation, as well as the certifications related to this role. We’ll also consider the job outlook for this occupation.
In fact, the BLS projects employment of information security analysts to grow 32% between 2022 and 2032, a rate that is much faster than the average for all occupations, with about 16,800 job openings in the category each year, on average, over this period.1 This growth is projected on a national level and local growth will vary by location. This projection is not specific to DeVry graduates and may include earners at all stages of their careers, not just entry-level.
1Growth projected on a national level and local growth will vary by location. BLS projections are not specific to DeVry graduates and may include earners at all stages of their careers, not just entry-level. https://www.bls.gov/ooh/computer-and-information-technology/information-security-analysts.htm
2As part of this program, one complimentary laptop is provided to students enrolled in the Associate in Cybersecurity and Networking, Associate in Information Technology and Networking, Associate in Engineering Technology, Bachelor’s of Information Technology and Networking, Bachelor’s of Software Development, Bachelor’s of Engineering Technology, Bachelor’s of Cybersecurity and Networking and Bachelor’s of Computer Information Systems. The laptop is issued during the student’s second session. Certain restrictions apply.
Filter Blog Post Category