Welcome to the Institute for Cybersecurity

Regent University's Institute for Cybersecurity is an academic, training, and research center located on Regent's Virginia Beach campus. Cybersecurity is one of the fastest growing careers across all industry sectors with a shortfall of 1.5 million in job openings and expanding. Additionally, cyber threats have grown in sophistication and severity, requiring educational institutions to move quickly to meet skill level training and development.

To fill this, growing, urgent need, we are dedicated to training and research to prepare the next generation of highly skilled cybersecurity professionals and leaders to fill those positions as technical experts and leaders who will work in government, industry, military, and academic sectors to meet the challenges in cybersecurity policy, technology and education.

Our faculty are industry experts with real-world expertise who bring a hands-on approach to training and a forward-thinking research and development focus to meet the growing need for best-in-class professionals seeking a range of certificate and training options. Additionally, the institute will provide support for our academic security training programs.



Interested in a career in one of the fastest growing fields in the world? Choose to earn your associate, bachelor's or master's degree at Regent.

Based in Virginia Beach, Virginia, we offer online programs in:

  • Computer Science
  • Cyber and Digital Forensics
  • Cybersecurity
  • Information Systems

Explore Programs


Featured Events

Wednesday, July 26 | 6 – 8 PM

The International Information Systems Security Certification Consortium Meeting

Freeman Building, Room 202, Christopher Newport University

Tuesday, July 4 | 6 – 8 PM

The Hampton Roads ISSA group Meeting

Booz Allen Hamilton Building, Suite 450, 5800 Lake Wright Drive, Norfolk, VA 23502

View all Events

Institute for Cybersecurity News

New Cyberattack Spreads in Europe, Russia and U.S.
(New York Times) Computer systems from Russia to the United States were struck on Tuesday in an international cyberattack that bore similarities to a recent assault that crippled tens of thousands of machines worldwide.

Conflict Minerals: The Dark Side of the Digital Age Electronics Boom
(The Cipher Brief) With the advent of digital communications, people thousands of miles apart can engage with each other seamlessly, and businesses can operate at a scale previously unknown, thanks to a burgeoning consumer electronics industry. But not all aspects of this industry are positive. Some contribute to global insecurity and human suffering.

US official announces cyber pact with Israel
(Associated Press) President Donald Trump’s homeland security adviser has announced a new cybersecurity partnership with Israel.

Under pressure, Western tech firms bow to Russian demands to share cyber secrets
(Reuters) Western technology companies, including Cisco, IBM and SAP, are acceding to demands by Moscow for access to closely guarded product security secrets, at a time when Russia has been accused of a growing number of cyber attacks on the West, a Reuters investigation has found.

US cyber weapons disappoint against ISIS
The realization that cyber weapons will buy time, but will not create a permanent, effective solution is becoming more apparent as the cyberattacks against the Islamic State repeatedly disappoint, according to the New York Times.

Russia has developed a cyberweapon that can disrupt power grids, according to ne
(Washington Post) Hackers allied with the Russian government have devised a cyberweapon that has the potential to be the most disruptive yet against electric systems that Americans depend on for daily life, according to U.S. researchers.

Profiles in cyber: Understanding the US’s major adversaries in cyberspace
In this piece, we build on those reports, drawing from recent congressional testimony, published cybersecurity research and expert commentary to provide you with a profile for each major U.S. cyber adversary. In doing so, we hope to have created a concise introduction and convenient reference to the distinct motives, narratives, strategies, capabilities and operations of each nation-state threat actor. We also think the similarities, where they exist, will be insightful.

DoD's assessment of China's information capabilities
The Department of Defense made public this week its annual report to Congress on China’s military developments, shedding some light on information-based capabilities including cyber, electromagnetic spectrum operations and space operations.

WikiLeaks Dump Shines Light on Government’s Shadowy Zero-Day Policy
WikiLeaks’ massive release of CIA cyber exploits this week produced more questions than answers about the government’s shadowy procedure for hoarding damaging digital vulnerabilities that remain unknown even to a system's manufacturer.

View All News

Student Spotlight

Trevor Hayes

"As soon as I got here, I knew this was the place for me. I hope to become a pilot in the Navy, and Cybersecurity gives me a strong foundation in technical and strategic thinking."


Trevor Hayes

Current Student

College of Arts & Sciences