The Bachelor of Science in Cybersecurity program is designed to provide an inter- disciplinary knowledge and skills to contribute to the pool of cyber security professionals in the country as part of the National Cybersecurity Plan. The program includes the study of technology, strategy, policy, legality, and standards regarding the security of and operations in cyberspace. It allows students to explore cybersecurity solutions and frameworks that address problems in the design, development, implementation, and life-cycle support of secured information and computer systems. The program gives importance on the practical and theoretical aspects of cybersecurity across a range of fundamental areas, such as network security and vulnerability assessment, network infrastructure, software application, social psychology, microeconomics (economic impact), information security policy, governance, and digital forensics.

Upon graduating in the program, the students shall have the:

a.) Gain strong knowledge of the cyberspace, including (a) familiarity with common computing themes and principles, (b) high-level understanding of systems as a whole, (c) understanding of the theoretical underpinnings of the cyberspace and their influences in practice and (d) demonstrating basic technical skills – to identify, analyze, evaluate, synthesize, articulate, and research literature on complex computing and information security problems.

b.) Apply knowledge of computing concepts, theories, principles, and current trends and contemporary issues from specialized fields and allied disciplines in the abstraction, conceptualization, formulation of substantiated conclusions using fundamental principles in the critical analysis of cybersecurity issues and problems.

c.) Evaluate requirements of simple to complex computing and information security issues, risks, and problems and apply the mathematical foundations, algorithmic principles, computing theories in modeling, designing, and developing solutions and protection systems.

d.) Comprehend the processes and challenges that support the delivery and management of information security in an organization as well as the impact of computing solution designs with consideration for public health and safety, cultural, environmental, and societal aspects.

e.) Demonstrate applied knowledge and comprehension of computing theories, principles, information security issues, and implications in weighing the tradeoffs involved in design, development, and utilization of computing solutions and information systems.

f.) Identify and evaluate both legacy and current tools, techniques, algorithms, trends, and technologies as well as their limitations and determine the most appropriate to use to address computing and information security risks, issues, or problems.

g.) Work professionally, harmoniously, and effectively in multidisciplinary and multicultural teams to accomplish a common goal while being able to exhibit independence and reliability in assigned tasks.

h.) Communicate, comprehend, and follow procedure, and explain technology and information systems security solutions, oral and written, to various stakeholders from different cultures and societies in an effective and respectful manner.

i.) Distinguish the legal, social, ethical, and professional issues involved in cybersecurity including their implications and be guided in adopting, creating, using, and sharing computing solutions in protecting information systems.

j.) Recognize the need for continuous professional and personal development and can engage in independent learning, be open to new ideas, trends, and innovation, and seek further knowledge.


Three (3) to five (5) years from graduation, BS Cybersecurity graduates of USTP are:

1. Competent professionals with the technical knowledge and skills needed to provide and manage cybersecurity solutions and services in response to the needs of the business, industry, government, and academe based on the National Cybersecurity Plan, international standards, and their global implications.

2. Leaders who can understand cybersecurity issues and practices from both technical, organizational, and social points of view in the context of cyberspace.

3. Collaborators and team players who are capable of interacting, motivating, and influencing people in various entities in planning, implementing, and monitoring cyber security mechanisms to help ensure the prediction, prevention, detection, and protection of information and communication technology assets.

  • Cloud Security Analyst 
  • Cybersecurity Officer 
  • Cybersecurity Trainer 
  • Data Privacy Officer 
  • Information Assurance Specialist 
  • IT Auditor 
  • Malware Analyst
  • Network Security Engineer
  • PEN Tester
  • Risk Management Analyst
  • Secured Developer
  • Secured Programmer
  • Security Analyst



Bachelor of Science in Cybersecurity