It seems we learn daily of a crisis caused by cyber security challenges of both public and private sector employees. This growing field is in high demand for talented cybersecurity professionals who are driven by their love for technology and the interesting, challenging, and meaningful work that a cyber defense career can provide.


Why study Cyber Defense at Coastal Georgia?

The Cyber Defense concentration at Coastal is unique because it allows you to combine your interest in criminal justice and investigation with your talent in information technology. Those who work in the field of cyber defense can make an impact by helping keep governments, businesses, and even our nation's critical infrastructure safe and functioning.

"The college students are getting real-world training that can't be duplicated in a classroom environment," said Assistant Professor of Cyber Defense, Dr. Nelbert "Doc" St. Clair.

What will I learn?

Coastal Georgia students benefit by participating in a required internship within the information technology field, providing real world experience. As part of the learning process, students enter cybersecurity competitions, also known as CTF (capture the flag). This gamified approach helps students learn at their own pace while competing against other students. Our students also benefit from research initiatives - attending cybersecurity conferences and participating in community service projects.

What can I do when I graduate?

Data Security

  • Protecting and maintaining the integrity of businesses, customers, and other data

Application Security

  • Ensuring software and other applications cannot be hacked, compromised, accessed or disabled without proper authorization

Network Security

  • Protecting network infrastructure and software from unauthorized access

Operational Security

  • Day-to-day monitoring and security management

Identity and Access Management (IAM)

  • Authenticating users and authorizing them to access specific applications, data, and other systems

Privileged Access Management (PAM)

  • Controlling and monitoring privileged access for users, accounts, applications, and other system assets

Vulnerability Management (VM)

  • Proactive identification (such as scanning) and resolution (such as patching, systems hardening, implementing new solutions, etc.) of potential threats and vulnerabilities in the IT ecosystem

Enterprise Mobility Management (EMM)

  • This can include mobile device management (MDM) and other processes and technologies for securely enabling a mobile workforce

Security Training

  • Teaching employees and other users to identify and appropriately deal with common security issues like phishing, malware, or social engineering.


A group of Cyber Defense students spent their Thanksgiving holiday installing upgrades on computers at the Boys and Girls Club.

Read the Story

Contact Information:

Dr. Nelbert St. Clair

Assistant Professor of Cyber Defense