Request Info

Provide your information below and an Admissions Advisor will contact you shortly to answer your questions about UAT and your Advancing Technology degree program of interest.

Required Fields Are Highlighted

Continue
Continue
  • University of Advancing Technology (UAT) is pleased to provide you with additional information about the college and its programs. By hitting submit, you give us permission to use either direct-dialed, autodialed and/or pre-recorded telemarketing to call or text you at the phone number you provided. Please note that such consent is not required to attend UAT.
Submit

Network Security (BS)

Network Security (BS)

Network Security Degree

Secure Information and Your Future With a Cyber Security Degree

A US Government Recognized Cyber Security Degree For Ethical Hackers.

Offered by an elite technology college, UAT’s Network Security Bachelor of Science is a cyber security degree that prepares students to take on the ever evolving world of online theft and corruption of information. Our cyber security degree combines essential and best of class elements of software and network programming and network security analysis. This leading edge cyber security degree is designed around the contemporary skills and advanced industry-standard tools associated with security for information network technology initiatives.

Designated as a Center for Academic Excellence in Information Systems Security Education by the US National Security Agency, UAT offers an ethical hacking degree that’s highly recognized by industry and government entities alike.

Graduates from the cyber security degree program will have developed the essential knowledge and tools to automate their own security processes through extensive training in network security programs and scripts. UAT’s Network Security degree students will be taught to use critical thinking skills to research current and evolving cyber security trends. Students in the cyber security degree will also become experts in network security industry standards and regulations already defined as well as those that are still evolving.

The Highest Standard of Ethical Hacking

The focus of this cyber security degree is creating elite CEHs and network security professionals who will have mastery in ethical hacking, upholding to the highest industry standard of integrity over the quickly evolving world of technology and online security.

Network security initiatives are becoming increasingly vital to the well-being of the general population and all business and government organizations. Graduates with UAT’s network security degree will be prepared for careers with government entities and multinational corporations seeking certified ethical hacking professionals. With the completion of this NSA designated network security degree, you will gain the ability to protect and defend commerce and culture against the online world of theft and corruption.

Request Info

Provide your information below and an Admissions Advisor will contact you shortly to answer your questions about UAT and your Advancing Technology degree program of interest.

Required Fields Are Highlighted

Continue
Continue
  • University of Advancing Technology (UAT) is pleased to provide you with additional information about the college and its programs. By hitting submit, you give us permission to use either direct-dialed, autodialed and/or pre-recorded telemarketing to call or text you at the phone number you provided. Please note that such consent is not required to attend UAT.
Submit

Network Security Course Description

A network security specialist is a professional who focuses on ensuring information confidentiality, integrity and availability. This includes the design of information assurance programs, policies, procedures and architecture utilizing the concepts of security by design. Network security utilizes proactive techniques, including defense-in-depth and layered security, to mitigate or eliminate vulnerabilities in information systems and to protect against potential exploitation. Professionals in this career path may be highly technical and practice active (and sometimes aggressive) technical security methodologies to test and verify security implementations at various levels within an organization. Security professionals possess intimate knowledge of technical business critical components. They also provide analysis and assessment of the security risks and requirements of those information systems while still developing non-technical skills such as teamwork, troubleshooting, problem solving, documentation and interpersonal communication. The Network Security degree reflects the application of theory and is aligned with industry standards and guidelines. It provides students with the opportunity to synthesize and apply the vital skills and knowledge necessary to succeed in the workforce.
Network Security

Network Security Degree Objectives

  • Create a network infrastructure design communications document that includes identified hardware components, connections to outside world, identified physical layer connectivity (media), and addressing.
  • Install, configure and test security hardware and software tools with supporting documentation such as port scanners, vulnerability detection systems, intrusion detection systems, firewalls, system hardening, anti-virus tools, patch management, auditing and assessment.
  • Construct, implement and document a script or a program to automate a security-related process or other task such as installation, administration, management, mapping resources, logon scripts, patch management, updates, auditing, analysis and assessment.
  • Create a policy or procedure that addresses events such as: a disaster recovery plan, a business continuity plan, incident response policy, acceptable usage document, information security policy, physical security policy, assessments or troubleshooting procedures.
  • Develop a research report or implementation plan concerning legal and ethical best practices and mandated requirements that pertain to information security.
  • Research, document, test and evaluate several current industry information security based threats, risks, malicious activities, covert methodology, encryption technologies, mitigation techniques or unconventional tactics to prevent loss of sensitive information and data confidentiality, integrity and availability.

Network Security Program Information

  • Program Credits: 120
  • Major Credits: 36
  • Semesters to completion: 8

Requirements to graduate include a 2.0 CGPA, completed required coursework, Portfolio, Internship, and a Student Innovation Project.

For a more detailed breakout of completion time frames and rates, please see the UAT Fast Facts page.

From the Cyber Security Blog

    proxyham-100596165-primary.idge

    DEF CON Talk Cancelled

    Each year at DEF CON, we receive a huge number of submissions. While most of them are interesting to some portion of our attendee population, there are normally a few talks that seem to have mass appeal. This year, DEF CON received a submission ...

    Read full entry »

    07.13.15 | Russ Rogers | 0 comments
    Layer8 Capture the Flag

    Capture The Flag For Ethical Hackers

    UAT Network Security students who belong to ethical hacking group ‘Layer8′ have began an intense 3-day worldwide challenge of Capture the Flag (CTF), hosted virtually in Milan, Italy. This is not your childhood game of hiding a red ...

    Read full entry »

    07.10.15 | Lauren Fach | 0 comments
    DEF CON

    5 Things You May Not Know About DEF CON

    DEF CON is one of the world’s largest annual hacker conventions, held every year in Las Vegas, since its inception in June 1993. The special sauce to DEF CON is that growth is largely organic and unplanned. As the conference has evolved, ...

    Read full entry »

    07.03.15 | Lauren Fach | 0 comments

Network Security Disclosure

At University of Advancing Technology, we believe that students and families should be prepared financially for college and understand employment opportunities prior to starting any program. In an effort to ensure you have the information you need to make informed choices on program cost, medial loan debt incurred by students who completed the program, on-time completion rates, and the occupations this program prepares you to enter, the Department of Education has instituted the following disclosure template.* For more information, click on the respective academic level.

UAT Accreditation and Recognition

Higher Learning Commission Mark of Affiliation

UAT is accredited by the Higher Learning Commission.

www.ncahlc.org
800.621.7440

Read More
U.S. Department of Homeland Security

Approved by the Student and Exchange Visitor Information Systems (SEVIS) for training of foreign students

Read More
National Security Acengy

Network Security curriculum certified by the US National Security Agency’s Information Assurance Courseware Evaluation program

Read More
Central Security Service

Designated Center of Academic Excellence in Information Assurance Education (CAEIAE)

Read More
The Princeton Review

Ranked as a Top Undergraduate Game Design Program in 2012 by the Princeton Review

Read More