Best Dynamic Application Security Testing (DAST) Tools

Discover the top DAST tools with features like automated scanning, vulnerability detection, reporting, and integrations.

Last updated on May 6, 2026 22 Minutes To Read
Caitlin Harris Written by Caitlin Harris
Laura Iannini Technical Review by Laura Iannini

Quick Summary

In our evaluation, Invicti combines DAST and IAST detection with strong developer education features for teams managing mixed application portfolios. Acunetix excels for teams embedding security into CI/CD with line-level remediation guidance. For compliance-focused teams needing validated findings without false positive noise, Edgescan DAST delivers expert human validation alongside automated scanning.

Top 11 Dynamic Application Security Testing (DAST) Tools

Dynamic application security testing means running active scans against your applications while they operate, surfacing vulnerabilities that static analysis misses. The challenge: DAST tools generate noise, false positives that waste your security team’s time triaging findings that aren’t real issues.

The decision comes down to finding them accurately and delivering them in a form your development teams will actually remediate. Some DAST platforms scan broadly but overwhelm your team with noise. Others integrate deeply but lack coverage for modern frameworks. Getting it wrong means either fixing hundreds of false positives or missing real exploitable vulnerabilities until production encounters them.

We evaluated 11 DAST tools across vulnerability detection accuracy, false positive rates, CI/CD integration, remediation guidance quality, and operational usability. We evaluated each in controlled environments simulating enterprise applications spanning legacy monoliths and modern single-page applications. We also reviewed customer experiences to identify deployment realities beyond vendor marketing.

This guide gives you the testing insights and decision framework to choose a DAST solution that matches your development workflow, application portfolio, and team capability.

Our Recommendations

Your ideal DAST solution depends on application portfolio diversity, development team maturity, and how tightly security integrates into your workflow. Your security stack already tells you where the gaps are.

  • Best For Mixed Application Portfolios: Invicti combines DAST and IAST scanning with developer education features that reduce recurring vulnerabilities.
  • Best For DevSecOps Workflows: Acunetix delivers line-level remediation guidance and proof-of-exploit validation that fits active development cycles.
  • Best For Compliance-Driven Teams: Edgescan DAST validates findings with human expert review, eliminating false positives before they hit your team.
  • Best For Developer Adoption: Aikido Security prioritizes low alert fatigue with deduplication and severity-based filtering.
  • Best For Large Application Portfolios: BlackDuck Continuous Dynamic , Veracode DAST scales to simultaneous scanning of multiple applications with low false positive rates.

Invicti is an enterprise application security testing platform that combines DAST and IAST scanning in one tool. It targets larger development teams that need automated vulnerability detection integrated directly into their SDLC.

Dual-Engine Scanning That Cuts Through Noise

The combination of dynamic and interactive testing gives you visibility into runtime vulnerabilities that single-method tools miss. We found the signature and behavior-based detection reduces false positives significantly. That means less time triaging noise and more time fixing real issues.

The developer education component stands out. Invicti helps your dev team understand why code fails security checks, not just that it failed. This reduces the same vulnerabilities appearing scan after scan.

What Customers Are Saying

Users praise the easy deployment and integration story. SSO, DevOps pipelines, and standard enterprise tooling connect without friction. Reports translate well to remediation teams and provide enough detail to guide fixes.

Some customers flag that single page applications still need better coverage.

Right Fit for Mixed Portfolios

We think Invicti works best for teams running mixed application portfolios with legacy and modern apps. If your environment is heavily SPA-based, evaluate coverage carefully before committing.

Strengths

  • Dual DAST and IAST scanning catches vulnerabilities that single-method tools miss
  • Behavior-based testing significantly reduces false positive rates
  • Developer education features help prevent recurring security issues
  • Integrates smoothly with existing DevOps and SSO infrastructure

Cautions

  • Based on customer feedback, single page application scanning still has coverage gaps according to some users
  • Based on customer reviews, best suited for enterprises, smaller teams may find it oversized

Acunetix is a web application security scanner that combines DAST and IAST to detect vulnerabilities across websites, APIs, and single-page applications. It targets development teams that want security testing built into their CI/CD workflow with actionable fix guidance.

Line-Level Remediation That Speeds up Fixes

The standout feature is remediation guidance that points to exact lines of code. We found this cuts back-and-forth between security and dev teams significantly. The proof-of-exploit capability validates findings before they hit your backlog, reducing false positive noise.

Automatic discovery handles websites and APIs you may not know about. For teams running script-heavy SPAs or password-protected areas, the scanner reaches places other tools skip.

What Customers Are Saying

Users praise the intuitive dashboard and CI/CD integration. Jira connectivity and pipeline automation work without heavy customization. Support responds quickly when questions come up.

Some customers flag that deep scans on large applications consume significant resources and time.

Best for DevSecOps Teams With Active Pipelines

We think Acunetix fits best in environments where developers own security fixes. The remediation guidance assumes your team acts on findings, not just triages them.

Strengths

  • Remediation guidance identifies exact code lines needing fixes
  • Proof-of-exploit validation reduces false positive triage time
  • Automatic discovery finds websites and APIs across your environment
  • Native CI/CD and Jira integration fits modern DevSecOps workflows

Cautions

  • Some customer reviews highlight that deep scans on large applications can be resource-intensive and slow
  • According to customer feedback, initial setup and integration configuration requires technical patience

Edgescan DAST is a SaaS vulnerability scanner that combines automated detection with human expert validation. It targets organizations that need verified findings without false positive noise cluttering their remediation queue.

Human-Validated Results Cut Through Scanner Noise

The differentiator here is expert validation. Every finding gets reviewed by security professionals before it reaches your team. We found this eliminates the false positive triage that eats up time with other scanners.

Risk-based scoring using EVSS and integrated threat feeds like CISA KEV helps prioritize what matters. The platform tracks vulnerability trends over time, which makes compliance reporting and ISO 27001 audits straightforward.

What Customers Are Saying

Users consistently highlight the support team as responsive and knowledgeable. Setup is quick, and the remediation guidance includes CVE context that speeds up fixes.

Some customers flag that scans run slower than expected, particularly rescans.

Right Fit for Compliance-Driven Teams

We think Edgescan works best for teams where validated findings matter more than scan speed. If your auditors or executives need clean, prioritized reports, the expert review adds real value.

Strengths

  • Human expert validation eliminates false positives from your remediation queue
  • Risk-based scoring with CISA KEV integration prioritizes exploitable vulnerabilities first
  • Clear trend tracking simplifies compliance reporting and ISO 27001 audits
  • Responsive support team provides security guidance beyond just platform help

Cautions

  • Some users have reported that scan and rescan times run longer than some teams expect
  • Based on customer feedback, interface navigation takes adjustment for users new to detailed vulnerability data
4.

Aikido Security

Aikido Security Logo

Aikido Security is a developer-focused DAST platform that runs vulnerability scans in temporary environments with read-only access to your code. It targets engineering teams that want security findings they can actually act on without drowning in noise.

Low-Noise Scanning That Developers Actually Use

The platform prioritizes reducing alert fatigue over catching everything. We found the false positive removal and severity-based deduplication keeps findings actionable. Scans run in isolated temporary environments that get deleted after completion, which limits exposure risk.

Read-only access means Aikido cannot modify your source code. Combined with SOC2 Type II and ISO 27001:2022 compliance, security-conscious teams get the controls they need.

What Customers Are Saying

Users consistently praise the onboarding experience and intuitive dashboard. Integration with version control and CI/CD workflows takes minutes, not days. The AI fix recommendations help engineers understand what to change without security team hand-holding.

Some customers flag that reporting and advanced configuration feel limited compared to mature enterprise tools.

Built for Growing Dev Teams

We think Aikido fits best in small to mid-sized engineering organizations where developer adoption matters more than feature depth. If your security findings sit ignored because nobody trusts the scanner, this solves that problem.

Strengths

  • Temporary scan environments and read-only access minimize security exposure risk
  • False positive removal and alert deduplication keep findings actionable for developers
  • Fast onboarding with broad version control and cloud provider compatibility
  • AI-powered fix recommendations help engineers remediate without security team bottlenecks

Cautions

  • According to customer feedback, reporting and advanced configuration options lag behind mature enterprise tools
  • According to some user reviews, security assessment depth falls short for dedicated security engineering teams
5.

BlackDuck Continuous Dynamic

BlackDuck Continuous Dynamic Logo

BlackDuck Continuous Dynamic is a cloud-based DAST platform that runs continuous vulnerability assessments across QA and production environments. It targets organizations wanting always-on security scanning that adapts automatically as code changes.

Always-On Scanning That Tracks Code Changes

The continuous scanning model stands out from point-in-time assessments. We found the platform detects new vulnerabilities as soon as code deploys, keeping security current without manual scan scheduling. AI-enabled verification filters findings before they reach your team, cutting triage time.

The WhiteHat Security Index provides a single score for overall security posture. For executives and compliance reporting, this simplifies status communication without diving into vulnerability details.

Strong Support, Some Reporting Friction

Users highlight the implementation experience as smooth, with support teams that respond quickly and know the product well. The interface is intuitive enough that teams get productive fast.

Some customers flag reporting bugs that persist across releases. For teams relying heavily on automated reports for compliance or stakeholder communication, this creates friction. The broader Black Duck ecosystem handles SCA and SAST well, but evaluate the DAST-specific reporting against your needs.

Right for Production-Safe Continuous Testing

We think BlackDuck Continuous Dynamic fits organizations that need production scanning without disruption. The benign injection approach keeps assessments safe for live environments.

Strengths

  • Continuous scanning detects vulnerabilities immediately as code changes deploy
  • AI-enabled verification reduces false positives and triage workload
  • Benign injections enable safe vulnerability testing in production environments
  • WhiteHat Security Index simplifies security posture communication to stakeholders

Cautions

  • Based on customer feedback, some reporting bugs persist across multiple releases according to users
  • Some users have reported that continuous model may exceed needs for teams using periodic assessment workflows
6.

Checkmarx DAST

Checkmarx DAST Logo

Checkmarx DAST is part of the CheckmarxOne platform, combining dynamic testing with SAST, SCA, and other security tools in a unified dashboard. It targets teams that want to consolidate application security under one vendor with deep CI/CD integration.

Unified Platform Simplifies the Security Stack

The value proposition is consolidation. Running DAST alongside SAST and SCA from one dashboard eliminates tool sprawl and gives a single view of application risk. We found the CI/CD integration works smoothly, with multiple scan types triggered from one action.

Cloud-powered scanning removes infrastructure management overhead.

What Customers Are Saying

Users consistently highlight the onboarding and customer success experience. The vendor partners closely during implementation and stays engaged post-rollout. For global deployments, the platform scales across multiple teams and projects without friction.

Some customers flag UX limitations in the portal.

Best as Part of a Broader Checkmarx Investment

We think Checkmarx DAST makes most sense when you’re buying into the full platform. Standalone DAST tools may offer deeper specialization, but the unified dashboard and single-vendor simplicity add real operational value.

Strengths

  • Unified platform combines DAST, SAST, and SCA in one dashboard
  • CI/CD integration triggers multiple scan types from single pipeline actions
  • Cloud-powered scanning eliminates infrastructure management overhead
  • Strong onboarding and customer success support through implementation

Cautions

  • Portal UX has limitations that some users find frustrating
  • According to customer feedback, container and API security features lag behind core SAST and SCA capabilities
7.

HCL AppScan

HCL AppScan Logo

HCL AppScan is a DAST tool built for scanning complex web applications, APIs, and mobile backends. It targets security teams and penetration testers who need detailed compliance reporting alongside vulnerability detection.

Handles Complexity That Trips Up Other Scanners

The platform shines on large, intricate applications. Machine learning components help navigate complex app structures that simpler scanners miss. We found the multi-step sequence recording captures authentication flows and business logic paths that matter for real-world testing.

Incremental scanning focuses on changed sections rather than full rescans. For teams with large application portfolios, this saves significant time without sacrificing coverage.

Strong Engine, Mixed Usability Feedback

Users praise the scanning engine and reporting capabilities. Compliance reports map directly to PCI, HIPAA, and OWASP Top 10, which simplifies audit preparation. DevOps pipeline integration and centralized dashboards help teams track vulnerability trends.

Some customers flag that the platform requires careful configuration to get right. The learning curve is real, and one user noted usability and automation need improvement for modern enterprise workflows. Support experiences vary. Teams willing to invest in tuning get solid results; those expecting plug-and-play may struggle initially.

Built for Security Teams with Complex Portfolios

We think HCL AppScan fits organizations with large, complex application environments where simpler tools fall short. If your apps involve multi-step workflows and you need compliance-ready reporting, the capabilities match the need.

Strengths

  • Machine learning navigation handles complex applications that trip up simpler scanners
  • Incremental scanning reduces time spent on large application portfolios
  • Compliance reports map directly to PCI, HIPAA, and OWASP Top 10 requirements
  • Multi-step sequence recording captures authentication and business logic flows

Cautions

  • Some users mention that requires careful configuration and tuning to achieve optimal scan results
  • Based on customer reviews, usability and automation features lag behind some modern enterprise expectations
8.

Intruder

Intruder Logo

Intruder is a vulnerability scanning platform that covers network infrastructure, web applications, and APIs with continuous attack surface monitoring. It targets organizations that want straightforward scanning without the complexity of enterprise-scale tools.

Simple Setup With Continuous Discovery

The onboarding experience stands out. We found setup takes minimal effort, and scans return actionable findings without extensive tuning. Continuous discovery catches changes in cloud footprints automatically, which matters when infrastructure shifts frequently.

Risk prioritization filters the noise so teams focus on high-impact fixes first. The alerting system avoids burying you in irrelevant notifications, and reports come audit-ready for SOC2 and ISO 27001 compliance.

Human Support That Actually Helps

Users consistently highlight the human support team as a differentiator. When vulnerabilities surface, the team helps internal security staff understand findings and work through remediation. For organizations without deep security expertise on the house, this guidance adds real value.

The platform integrates without requiring infrastructure changes.

What Customers Are Saying

We think Intruder works best for mid-market organizations building out their security programs. If you need solid coverage at reasonable cost without enterprise vendor complexity, this delivers.

Strengths

  • Fast setup with low onboarding friction and minimal tuning required
  • Continuous discovery catches cloud infrastructure changes automatically
  • Human support team assists with vulnerability understanding and remediation
  • Audit-ready reports simplify SOC2 and ISO 27001 compliance preparation

Cautions

  • Some users mention that may lack advanced customization options for mature security operations
  • Some customer reviews flag that positioned for mid-market needs rather than enterprise-scale complexity
9.

OpenText Dynamic Application Security Testing

OpenText Dynamic Application Security Testing Logo

OpenText DAST identifies vulnerabilities by simulating external attacks against running applications. It targets enterprise teams needing flexible deployment options and broad compliance coverage across regulated industries.

Deployment Flexibility and API Coverage

The deployment options stand out. On-prem, SaaS, and AppSec-as-a-Service models let you match security requirements to organizational constraints. We found the API scanning covers the full spectrum: SOAP, REST, Swagger, OpenAPI, Postman and GraphQL, plus gRPC.

Pre-configured compliance policies for PCI DSS, NIST 800-53, OWASP, ISO 27K, and HIPAA reduce setup time for regulated environments. Kubernetes-based horizontal scaling handles large application portfolios without bottlenecks.

Enterprise Trust with Some Rough Edges

Long-term customers speak highly of scan result accuracy. Users running Fortify for five to seven years report it integrates well into their security workflows and covers broad application portfolios. The support team responds quickly with solid security expertise.

Some customers flag scan times as a challenge, particularly for certain programming languages where processing becomes resource-intensive. Dashboard limitations surface in feedback, and false positive rates vary by use case. Tuning expectations should be realistic for complex environments.

Fits Regulated Enterprise Environments

We think OpenText DAST works best in large organizations with compliance mandates and infrastructure teams that can manage deployment complexity. If you need pre-built regulatory reporting and flexible hosting options, this checks the boxes.

Strengths

  • Flexible deployment with on-prem, SaaS, and managed service options
  • Broad API scanning covers SOAP, REST, GraphQL, gRPC, and more
  • Pre-configured compliance policies simplify PCI, NIST, and HIPAA reporting
  • Kubernetes scaling handles large application portfolios efficiently

Cautions

  • According to some user reviews, scan times can be slow and resource-intensive for certain languages
  • Some users have reported that dashboard and reporting interfaces have limitations according to some users
10.

Rapid7 InsightAppSec

Rapid7 InsightAppSec Logo

Rapid7 InsightAppSec is a black-box DAST solution that identifies and triages application vulnerabilities across web apps and APIs. It targets teams wanting accurate scanning with manageable overhead, particularly those already invested in the Rapid7 ecosystem.

Universal Translator Handles Modern Tech Stacks

The Universal Translator feature parses diverse formats, protocols, and development technologies without manual configuration. We found this reduces setup friction when scanning applications built on mixed tech stacks. Attack Replay lets developers reproduce vulnerabilities locally, speeding up remediation cycles.

Both cloud and on-prem scanning engines give deployment flexibility. The attack framework library covers vulnerabilities that other tools often miss while keeping false positive rates reasonable.

What Customers Are Saying

Users highlight the dashboard as intuitive and accessible for teams without deep security specialization. Reports are detailed and easy to understand, with customizable application organization that maps to your structure. Rapid7 support gets consistently positive mentions.

Some customers flag CI/CD integration as challenging without technical assistance.

Strong Choice for Rapid7 Shops

We think InsightAppSec fits best in organizations already using Rapid7 tools. The interoperability across their security stack adds real value. Standalone, it competes well on scanning accuracy and usability.

Strengths

  • Universal Translator handles diverse protocols and technologies without manual setup
  • Attack Replay enables developers to reproduce and validate vulnerabilities locally
  • Intuitive dashboard provides clear visibility without requiring security expertise
  • Strong interoperability with other Rapid7 security tools

Cautions

  • According to some user reviews, CI/CD pipeline integration can be challenging without dedicated technical support
  • Based on customer feedback, authentication configuration requires careful setup to scan protected applications
11.

Veracode DAST

Veracode DAST Logo

Veracode DAST scans web applications and APIs for vulnerabilities, with strength in pre-production and staging environments behind firewalls. It targets teams needing fast, scalable scanning across large application portfolios with expert remediation support.

Speed and Scale for Large Portfolios

The unified crawl and audit feature delivers near-instant results with a claimed false positive rate under 5%. We found the ability to scan multiple applications simultaneously matters for organizations managing dozens or hundreds of apps. Pre-production scanning catches issues before they hit production.

Granular scan controls with scheduling and automation options let you tune scanning to your release cadence. Ticketing system integration pushes findings directly into existing workflows.

Strong Support, Some Regional Gaps

Users consistently praise the support team as responsive and knowledgeable. Expert remediation guidance helps teams understand not just what broke but how to fix it. The platform has improved significantly over the past two years based on customer feedback.

Some customers flag that the US market gets priority, with EU features arriving with slight delay. False positive rates vary by language, with Python and JavaScript projects seeing more noise. Scan performance can delay deployment pipelines for teams with tight CI/CD windows.

Fits Fast-Moving Enterprise Teams

We think Veracode DAST works best for organizations scanning large application portfolios where speed and scale matter. If your security team needs to cover many apps without drowning in manual triage, the low false positive rate helps.

Strengths

  • Simultaneous multi-application scanning handles large portfolios efficiently
  • Low false positive rate reduces triage burden on security teams
  • Pre-production and staging scanning catches vulnerabilities before deployment
  • Responsive support team with expert remediation guidance

Cautions

  • Based on customer feedback, python and JavaScript projects may see higher false positive rates
  • Some users report that scan performance can delay deployment pipelines in tight CI/CD workflows

Other Application Security Services

12
Qualys Web Application Scanning

A web application security scanner that automatically finds and verifies vulnerabilities.

13
Detectify

A web security scanner powered by ethical hackers.

14
Burp Suite DAST

A popular tool for web application security testing, including vulnerability scanning.

15
Bright Security

A developer-first DAST that integrates into the CI/CD pipeline.

What To Look For: DAST Solutions Checklist

When evaluating DAST solutions, we’ve identified six essential criteria. Here’s the checklist of questions you should be asking:

  • False Positive Rates and Detection Accuracy: How many false positives does the vendor report? Can you validate claimed findings in your environment before committing? Does the platform offer proof-of-exploit capabilities?
  • Framework and Language Support: Does it handle your application stack, React, Angular, Vue, Python, Node, Java, .NET? Can it scan single-page applications effectively? How about GraphQL and REST APIs?
  • CI/CD Integration and Workflow Fit: How easily does it integrate with your pipeline, GitHub, GitLab, Jenkins, Azure DevOps? Can you trigger scans automatically on commits? Does it provide actionable feedback developers will actually use?
  • Remediation Guidance and Developer Support: Does the platform explain not just what’s vulnerable but how to fix it? Does it point to specific code lines or just general categories? Will your developers trust and use the findings?
  • Scan Performance and Scalability: How long does a scan typically take on your applications? Can you scan multiple applications simultaneously? Does performance degrade with application complexity?
  • Compliance Reporting and Audit Requirements: Can it generate reports mapped to PCI DSS, HIPAA, or OWASP Top 10? How granular is the audit trail for compliance investigations? Does it support your specific regulatory requirements?

Weight these criteria based on your environment. Teams in compliance-heavy industries prioritize accurate reporting. DevSecOps teams need tight CI/CD integration and fast remediation feedback. Large enterprises care about scalability and multi-application coverage.

How We Compared The Best Dynamic Application Security Testing (DAST) Tools

Expert Insights is an independent editorial team that researches, tests, and reviews cybersecurity and IT solutions. No vendor can pay to influence our review of their products. Our Editor’s Scores are based solely on product quality. Before testing, we map the full vendor market for each category, identifying all active vendors from market leaders to emerging challengers.

We evaluated 11 DAST platforms across detection accuracy, false positive rates, framework coverage, CI/CD integration, remediation quality, and ease of operation. Each product was deployed in a controlled environment against applications spanning legacy monoliths and modern single-page applications. We assessed scan configuration, false positive rates, finding accuracy, alongside remediation guidance and day to day operational usability.

Beyond hands on testing, we conducted extensive market research and reviewed customer feedback and interviews where possible to validate vendor claims against operational reality. We spoke with product teams to understand detection methodologies, framework support roadmaps, and known limitations. Our editorial and commercial teams operate independently. No vendor can pay to influence our review of their products.

This guide is updated quarterly. For full details on our evaluation process, visit our How We Test & Review Products.

The Bottom Line

Your ideal DAST solution depends on application portfolio diversity, team maturity, and how security integrates into your development workflow.

If you manage mixed application portfolios with legacy and modern apps, Invicti delivers dual-engine scanning with developer education that reduces recurring vulnerabilities.

If you’re embedding security into active CI/CD workflows, Acunetix provides line-level remediation guidance and proof-of-exploit validation that developers will actually use.

If compliance and audit-ready reporting matter more than scan speed, Edgescan DAST validates findings with human expert review to eliminate false positives.

If you’re a small to mid-sized team prioritizing low alert fatigue, Aikido Security combines fast onboarding with deduplication that keeps findings actionable.

If you manage large application portfolios and need speed at scale, Veracode DAST delivers simultaneous multi-application scanning with expert remediation support.

Read the individual reviews above to dig into framework support, integration requirements, and the remediation workflow that fits your team.

FAQs

Everything You Need To Know About Dynamic Application Security Testing Tools (FAQs)

Written By Written By
Caitlin Harris
Caitlin Harris Deputy Head Of Content

Caitlin Harris is the Deputy Head of Content at Expert Insights. As an experienced content writer and editor, Caitlin helps cybersecurity leaders to cut through the noise in the cybersecurity space with expert analysis and insightful recommendations.

Prior to Expert Insights, Caitlin worked at QA Ltd, where she produced award-winning technical training materials, and she has also produced journalistic content over the course of her career.

Caitlin has 8 years of experience in the cybersecurity and technology space, helping technical teams, CISOs, and security professionals find clarity on complex, mission critical topics like security awareness training, backup and recovery, and endpoint protection.

Caitlin also hosts the Expert Insights Podcast and co-writes the weekly newsletter, Decrypted.

Technical Review Technical Review
Laura Iannini
Laura Iannini Cybersecurity Analyst

Laura Iannini is a Cybersecurity Analyst at Expert Insights. With deep cybersecurity knowledge and strong research skills, she leads Expert Insights’ product testing team, conducting thorough tests of product features and in-depth industry analysis to ensure that Expert Insights’ product reviews are definitive and insightful.

Laura also carries out wider analysis of vendor landscapes and industry trends to inform Expert Insights’ enterprise cybersecurity buyers’ guides, covering topics such as security awareness training, cloud backup and recovery, email security, and network monitoring. Prior to working at Expert Insights, Laura worked as a Senior Information Security Engineer at Constant Edge, where she tested cybersecurity solutions, carried out product demos, and provided high-quality ongoing technical support.

Laura holds a Bachelor’s degree in Cybersecurity from the University of West Florida.