Request Info

Provide your information below and an Admissions Advisor will contact you shortly to answer your questions about UAT and your Advancing Technology degree program of interest.

Required Fields Are Highlighted

Continue
Continue
  • University of Advancing Technology (UAT) is pleased to provide you with additional information about the college and its programs. By hitting submit, you give us permission to use either direct-dialed, autodialed and/or pre-recorded telemarketing to call or text you at the phone number you provided. Please note that such consent is not required to attend UAT.
Submit

Network Security (BS)

Network Security (BS)

Network Security Degree

Secure Information and Your Future With a Cyber Security Degree.

A US Government Recognized Cyber Security Degree For Ethical Hackers

Offered by an elite technology college, UAT’s Network Security Bachelor of Science is a cyber security degree that prepares students to take on the ever evolving world of online theft and corruption of information. Our cyber security degree combines essential and best of class elements of software and network programming and network security analysis. This leading edge cyber security degree is designed around the contemporary skills and advanced industry-standard tools associated with security for information network technology initiatives. Designated as a Center for Academic Excellence in Information Systems Security Education by the US National Security Agency, UAT’s cyber security degree is highly recognized by industry and government entities alike.

Graduates from the cyber security degree program will have developed the essential knowledge and tools to automate their own security processes through extensive training in network security programs and scripts. UAT’s Network Security degree students will be taught to use critical thinking skills to research current and evolving cyber security trends. Students in the cyber security degree will also become experts in network security industry standards and regulations that have already defined as well as those that are still evolving. The focus of this cyber security degree is creating elite CEHs and network security professionals who will have mastery and be upheld to the highest industry standard of integrity over the quickly evolving world of technology and online security.

Network security initiatives are becoming increasingly vital to the well-being of the general population and all business and government organizations. Graduates from the network security degree will be prepared for careers with government entities and multinational corporations seeking cyber security professionals with high integrity and ethical standards. With the completion of this NSA designated network security degree, you will gain the ability to protect and defend commerce and culture against the online world of theft and corruption.

Request Info

Provide your information below and an Admissions Advisor will contact you shortly to answer your questions about UAT and your Advancing Technology degree program of interest.

Required Fields Are Highlighted

Continue
Continue
  • University of Advancing Technology (UAT) is pleased to provide you with additional information about the college and its programs. By hitting submit, you give us permission to use either direct-dialed, autodialed and/or pre-recorded telemarketing to call or text you at the phone number you provided. Please note that such consent is not required to attend UAT.
Submit

Network Security Degree Objectives

  • Create a network infrastructure design communications document that includes identified hardware components, connections to outside world, identified physical layer connectivity (media), and addressing.
  • Install, configure and test security hardware and software tools with supporting documentation such as port scanners, vulnerability detection systems, intrusion detection systems, firewalls, system hardening, anti-virus tools, patch management, auditing and assessment.
  • Construct, implement and document a script or a program to automate a security-related process or other task such as installation, administration, management, mapping resources, logon scripts, patch management, updates, auditing, analysis and assessment.
  • Create a policy or procedure that addresses events such as: a disaster recovery plan, a business continuity plan, incident response policy, acceptable usage document, information security policy, physical security policy, assessments or troubleshooting procedures.
  • Develop a research report or implementation plan concerning legal and ethical best practices and mandated requirements that pertain to information security.
  • Research, document, test and evaluate several current industry information security based threats, risks, malicious activities, covert methodology, encryption technologies, mitigation techniques or unconventional tactics to prevent loss of sensitive information and data confidentiality, integrity and availability.

Network Security Program Information

  • Program Credits: 120
  • Major Credits: 36
  • Semesters to completion: 8

Requirements to graduate include a 2.0 CGPA, completed required coursework, Portfolio, Internship, and a Student Innovation Project.

For a more detailed breakout of completion time frames and rates, please see the UAT Fast Facts page.

From the Cyber Security Blog

International Cyber Defense Workshop (ICDW) June 4 - 8 2012

International Cyber Defense Workshop (ICDW) June 4 - 8 2012

Mr. Mike Coomes, U.S. DoD CIO’s International Cybersecurity Program Director invites you to participate in the 12th International Cyber Defense Workshop (ICDW) June 4-8, 2012. The ICDW is a virtual workshop for military information assurance specialists and computer science practitioners.

Read the rest of this entry »

05.21.12 | Professoressa Keating | 1 comment
Another icky Cybersecurity Bill on Capitol Hill

Another icky Cybersecurity Bill on Capitol Hill

A U.S. Senator’s bill to broaden cybersecurity intelligence gathering is in trouble after other legislators question whether proposed protections comes at the expense of citizens’ privacy…

Read the rest of this entry »

05.16.12 | Professoressa Keating | 0 comments
UAT welcome Rear Admiral Sanders - Thursday, March 29th

UAT welcome Rear Admiral Sanders - Thursday, March 29th

Please join us for this event if you can…

The University of Advancing Technology (UAT) is proud and honored to welcome Rear Admiral Sanders to our campus. RADM Sanders will address students, faculty and guests on the topic of ‘Maritime Strategy’ at 2:00 pm

Read the rest of this entry »

03.23.12 | Professoressa Keating | 0 comments

Network Security Disclosure

At University of Advancing Technology, we believe that students and families should be prepared financially for college and understand employment opportunities prior to starting any program. In an effort to ensure you have the information you need to make informed choices on program cost, medial loan debt incurred by students who completed the program, on-time completion rates, and the occupations this program prepares you to enter, the Department of Education has instituted the following disclosure template.* For more information, click on the respective academic level.

UAT Accreditation and Recognition

Higher Learning Commission Mark of Affiliation

UAT is accredited by the Higher Learning Commission.

www.ncahlc.org
800.621.7440

Read More
U.S. Department of Homeland Security

Approved by the Student and Exchange Visitor Information Systems (SEVIS) for training of foreign students

Read More
National Security Acengy

Network Security curriculum certified by the US National Security Agency’s Information Assurance Courseware Evaluation program

Read More
Central Security Service

Designated Center of Academic Excellence in Information Assurance Education (CAEIAE)

Read More
The Princeton Review

Ranked as a Top Undergraduate Game Design Program in 2012 by the Princeton Review

Read More