header partial here

Cyber Security Degrees



UAT’s cyber security degree programs and cyber warfare range are recognized by industry and government entities alike for their ability to help generate the future innovators of the cyber security industry. We focus on creating true leaders who will have mastery in ethical hacking and uphold the highest industry standard of integrity in our quickly evolving world of cyber security tech and online security.

Leading cyber security education in the southwest, University of Advancing Technology (UAT) has surpassed 20 successful years since the inception of its elite Network Security degree program. As one of the longest-running cyber security degrees in the southwest, our complete continuum of undergraduate and graduate cyber security degrees have prepared thousands of ethical hacking, network security, and cyber security graduates. The NSA has designated UAT as a CAE training center in cyber defense.

1
2
3

Request Info

Provide your information below and an Admissions Advisor will contact you shortly to answer your questions about UAT and your Advancing Technology degree program of interest.

 
 
Next
Previous
 
Next
University of Advancing Technology (UAT) is pleased to provide you with additional information about the college and its programs. By clicking submit, you verify you are at least thirteen years of age, give us permission to store and process your personal information submitted above, and contact you through email, post, SMS, phone, autodialed and/or pre-recorded telemarketing. Carrier fees may apply to SMS messages, which can be opted out of at any time by replying STOP. Read our privacy policy here. Please note that such consent is not required to attend UAT and you may update your communication preferences at any time.
Previous
 
Submit
  • U.S government recognized cyber security degrees for ethical hackers
  • First university to offer a cyber security degree in Arizona
  • Recognized by industry and government for our ability to generate future innovators within cyber security
  • Graduating candidates with a NSA- and CAE- designated education from one of the longest running cyber security degrees in the Southwest
  • Designated as a National Center of Academic Excellence in Information Assurance Education (CAE/IAE) by the NSA

BACHELOR OF SCIENCE IN NETWORK SECURITY DEGREE

UAT’s cyber security degree is designated as a Center for Academic Excellence in Information Assurance Education (CAE/IAE) by the U.S. National Security Agency (NSA). Our cyber security degree combines essential and best-of-class elements of cyber software and cyber security-focused network programming, as well as network security analysis for the CEH training and pedigree network security professionals need to lead. Designed to educate the industry’s elite hackers as the next generation of ethical cyber security professionals, UAT’s undergraduate NetSec degree is one of the first accredited cyber security degrees in the nation from the first university in the southwest to offer a cyber degree. UAT’s white-hat cyber security program students focus on earning the coveted CEH credentials necessary to be this country’s most respected network security and cyber security ninjas trained to protect our nation’s assets.

MASTER OF SCIENCE IN CYBER SECURITY

Transforming your career onto the leading edge of the cyber security industry, the online or campus-based master’s degree in Cyber Security trains the next generation of white-hat cyber security leadership for industry and government. We understand that you as a working professional must study when and where your schedule best allows. Within this graduate cyber security degree program, you will have access to some of the most current tools and skills that redefine security information technology today. You can learn and network alongside other students and faculty at the top of the cyber security food chain. With the IA master’s degree, you have flexibility and support from working professionals who have years of experience crafting the curriculum in order to assure our students receive 360-degree support.

BACHELOR OF SCIENCE IN TECHNOLOGY FORENSICS DEGREE

Theft and corruption evolve as quickly as our economy, technology, and the cyber security environment. As a nation and within industry, government and business alike have an unmet need for cyber security professionals trained at the warrior level. Students within the Technology Forensics major work in teams consisting of and complemented by the continuum of UAT’s cyber security degree programs. The Technology Forensics degree focuses on investigating and analyzing digital data to prevent both foreign and domestic malicious theft and corruption. UAT’s Technology Forensics degree candidates master the methods of obtaining digital document information, understanding how data is compromised, and conducting expert testimony. The cyber security industry requires professionals who have the know-how to uncover data in computers, networks, devices, and recover deleted, encrypted, or corrupted information. Graduates of the Technology Forensics program earn the recognition and advancement of the UAT cyber security degree program pedigree. This degree is your chance to harness the opportunities to network and learn from some of the best in Technology Forensics.

BACHELOR OF SCIENCE IN NETWORK ENGINEERING DEGREE

Our data-dependent society now demands the top skills of cyber-security-focused network engineers. Designed to teach degree candidates how to secure enterprise-level networks, the network engineering program trains students to plan and enforce the security of existing computers and network systems. As a degree within UAT’s elite undergraduate cyber security degree programs, Network Engineering prepares skilled and motivated network engineers responsible for the design, implementation, and maintenance of protected and secure networked systems. The cyber security degree program requires mastery of both networking and IT systems. The network engineering major offers degree candidates a well-rounded knowledge base from which to draw upon: routing, switching, server operating systems, email systems, IP Telephony, wireless, and virtualization in demand with all modern systems.

Featured Video

See what Cyber Security leaders think of UAT. Meet Jeff Moss, founder of DEF CON and Black Hat.

FLICKR GALLERY

+ Follow

    FROM THE CYBER SECURITY BLOG

    The Integration of Drones into Cyber Security Strategies

    You may be surprised, but drones are playing a pivotal role in enhancing network security in several innovative ways. As technology evolves, the integration of drones into cybersecurity strategies has opened new...

    Read full entry »

    Defending Against Blacklotus: UAT's Cyber Security Program Sheds Light on UEFI Attacks

    The Blacklotus malware is a UEFI bootkit that targets systems at one of their earliest points of availability. During the boot process. ESET malware researcher Martin Smolár noted that this begins with executing an installer that deploys the bootkit files to the EFI system partition, disables the HVCI and BitLocker protections, and reboots the host....

    Read full entry »

    What is Kali Linux?

    Kali Linux, formerly Backtrack Linux, is a Debian-based and open-source operating system distribution with the intention of making penetration test and auditing tools available to the average user. Kali Linux can be installed or otherwise booted up with hundreds of tools preinstalled to make tasks such as forensics and reverse engineering much more accessible to...

    Read full entry »

    Running Your Own Email Server

    What is MIAB? Running your own email service provider sounds like a daunting task but it can be made easier by using an array of tools that have been combined into a self-hosted service called "Mail in a box" (MIAB). MIAB turns a fresh cloud computer into a functional mail server,...

    Read full entry »

    What is a Password Manager?

    Forgot Password? A password manager is a tool that is designed to manage many passwords in a secure and easy to access manner. Using a single password for all your accounts increases the likelihood that you will be breached over many accounts by a large percentage. It is important...

    Read full entry »

    UAT Retires Cyber Warfare Range, Introduces SOC

    UAT Adds Security Operation Center After more than 10 years, University of Advancing Technology (UAT) retired its Cyber Warfare Range and in August 2021, added its own Security Operations Center (SOC), where students can work alongside mentors...

    Read full entry »

NSA/DHS CYBER DEFENSE PROGRAM OF STUDY

The University of Advancing Technology is a designated Center of Academic Excellence - Cyber Defense Education (CAE-CDE) institution through the National Information Assurance Education Training Program (NIETP). Sponsored by the National Security Agency (NSA) and the Department of Homeland Security (DHS), NIETP operates under national authority as the national manager for cyber defense education and training relating to national security systems. For more information about the CAE Cyber Community, including resources, news, events and more, visit https://www.caecommunity.org.

UAT Accreditation and Recognition

nsa

Network Security curriculum certified by the US National Security Agency's Information Assurance Courseware Evaluation program

cae