Cybersecurity Program Header Image


Information security analysts set up plans to protect companies' information and technology from outsiders.

Information security analysts work with companies to build secure computer systems. They question managers and staff about their current security methods. They find out what information the company wants to protect. They determine what information employees should be able to access.

Analysts install software that protects the information. They may also make changes to existing software. They test the system once changes are made to make sure it works. They train staff on how to use security software and properly use computers to prevent security problems.

Analysts may build firewalls if the data are available to people over the Internet. These electronic walls keep people outside of an organization from accessing the protected information. They may encrypt information so that it remains confidential. They monitor virus software and update it regularly.

Information security analysts write rules and procedures for employees to follow once the security system is in place. Each part of the security plan must be followed for it to be effective. Analysts in some companies coordinate security for vendors and customers in addition to employees.

Analysts may also be responsible for physically locking down the hardware. They may buy equipment to secure servers, monitors, and hard drives so they cannot be removed from buildings. Larger companies may purchase metal detectors or video cameras as part of their security plan.

Information security analysts monitor data logs that report all the activity on a system. They look for any strange activity in the records. Some programs alert employees when there is a problem. Analysts evaluate security breaks and determine if there are problems or errors. If there is a problem, analysts track where the break came from and shut off the access point.

Information Above From Montana Career Information System

Job Title Average Wage Annual Job Openings Expected Growth
Information Security Analyst MT: $79,200/yr
US: $102,600/yr
MT: No data available
US: 16,300
MT: No data available
US: 33%

*Information obtained from O*NET OnLine

Cybersecurity A.A.S. Program Estimated Costs

Cybersecurity C.T.S. Program Estimated Costs

Figure Out Your Finances

Students seeking federal financial aid (which includes grants and loans) must complete the Free Application for Federal Student Aid (FAFSA) which online at As a result of completing a FAFSA, an applicant will receive a federal Student Aid Report (SAR) in the mail or online. An electronic version of the SAR is automatically sent to the schools listed on the FAFSA. To list Great Falls College MSU, use our school code: 009314.

Students applying for financial aid may also be required to provide proper federal income tax information, completed verification materials, and any other information requested by the Financial Aid Office. Students must apply for financial aid annually.

Assistance is available to prospective students applying for financial aid. In addition, financial aid counseling for new students is an integral part of the admissions and orientation process. Once enrolled, students may receive counseling and assistance as needed. For assistance, please call 406-771-4334, or write to the Financial Aid Office, Great Falls College MSU, 2100 16th Ave S, Great Falls, MT 59405, or email

Great Falls College MSU also offers a wide variety of different scholarships to assist you in paying for your college. To view a list of current scholarship offerings, please see our scholarship page.

Cybersecurity A.A.S. Program Requirements

Cybersecurity C.T.S. Program Requirements


Great Falls College MSU
Computer Science Programs In The News



Computer Information Technology Faculty


Photo of Steve Robinett

Steve Robinett, M.E.d.

Office: B123

Photo of Cheryl Simpson

Cheryl Simpson

Office: B122