Online Network Security (BS)

Online Network Security (BS)

Online Network Security Degree

An Online Cyber Security Degree gets you the tech respect for securing critical systems

With technology evolving at the speed of light both in commerce and culture, online theft and corruption of information is becoming more and more prevalent and detrimental. As there continues to be a shortage of cyber security experts in both the private and government sectors, our country needs more network security degree graduates to protect our infrastructure. An online cyber security degree is offered at UAT as a Bachelor of Science in Network Security to create elite CEHs and network security professionals who will have mastery in ethical hacking.

Designated as a Center for Academic Excellence in Information Systems Security Education, UAT offers this online cyber security degree to provide the advanced industry-standard tools and skills necessary that propels information network technology initiatives and ensures success in the network security field.

An Ethical Hacking Degree of the Highest Standard

UAT’s online network security degree prepares students to design networks using diagrams and documentation that secures cyber communication within an organization and throughout the outside world.

Mastering skills that reflect the highest standard of ethical hacking, graduates of UAT’s online network security degree program develop a solid understanding of every aspect of network and cyber security, from the designing and creation to the maintenance and defending of networks. Beyond developing the skills to create and manage security networks, online cyber security degree students will also learn how to analyze and recognize flaws in a network, thus enabling them to communicate to an organization the weaknesses of their systems and how to fix them. Furthermore, students enrolled in the online cyber security degree will earn the industry respect reserved for graduates of a top cyber security program from an elite technology university holding an NSA CAE-Cyber Operations designation. This top network security degree in certified ethical hacking will ensure you are trained to use critical thinking skills in order to research current and evolving security trends, making your knowledge the most relevant and up to date in the industry.

Request Info

Provide your information below and an Admissions Advisor will contact you shortly to answer your questions about UAT and your Advancing Technology degree program of interest.

Required Fields Are Highlighted

University of Advancing Technology (UAT) is pleased to provide you with additional information about the college and its programs. By hitting submit, you give us permission to use either direct-dialed, autodialed and/or pre-recorded telemarketing to call or text you at the phone number you provided. Please note that such consent is not required to attend UAT.

Need assistance with this form?

Featured Video

See what Cyber Security leaders think of UAT. Meet Jeff Moss, founder of DEF CON and Black Hat.

Why UAT-Online?

A Structured Course Load

Every online assignment is geared toward your technology degree program. Each online class follows a standard assignment schedule, ensuring a swift, successful completion of classes. This standardization, combined with a team-based approach and access to industry-standard toolsets and techniques, encourages development of the collaborative and creative skills necessary for the advancing technology workplace.

Online Network Security Degree Faculty

The UAT-Online network security faculty receives extensive training to help students succeed in an online environment. During class sessions, instructors participate in online lectures and discussion groups and respond to online questions. They also respond to emails and discussion threads. Students hand in their assignments via email or by posting the assignments online.

Online Network Security Degree Start Dates

Enrollment is ongoing for UAT-Online, so you may begin your online Network Security studies here at any time of the year.

Online Calendar


An online network security education at UAT is an investment, and we understand the amount of aid you receive may be a deciding factor in whether or not you attend. Therefore, UAT is committed to providing all our students with the information they need to finance their education.

View Financial Aid

Military Recognition

UAT has a variety of program offerings, learning delivery options and financial aid opportunities that will allow you to achieve your educational goals in a way that meets your needs.

View Military Offerings

Network Security Course Description

A network security specialist is a professional who focuses on ensuring information confidentiality, integrity and availability. This includes the design of information assurance programs, policies, procedures and architecture utilizing the concepts of security by design. Network security utilizes proactive techniques, including defense-in-depth and layered security, to mitigate or eliminate vulnerabilities in information systems and to protect against potential exploitation. Professionals in this career path may be highly technical and practice active (and sometimes aggressive) technical security methodologies to test and verify security implementations at various levels within an organization. Security professionals possess intimate knowledge of technical business critical components. They also provide analysis and assessment of the security risks and requirements of those information systems while still developing non-technical skills such as teamwork, troubleshooting, problem solving, documentation and interpersonal communication. The Network Security degree reflects the application of theory and is aligned with industry standards and guidelines. It provides students with the opportunity to synthesize and apply the vital skills and knowledge necessary to succeed in the workforce.
Network Security Online Degree

Network Security Degree Objectives

  • Create a network infrastructure design communications document that includes identified hardware components, connections to outside world, identified physical layer connectivity (media), and addressing.
  • Install, configure and test security hardware and software tools with supporting documentation such as port scanners, vulnerability detection systems, intrusion detection systems, firewalls, system hardening, anti-virus tools, patch management, auditing and assessment.
  • Construct, implement and document a script or a program to automate a security-related process or other task such as installation, administration, management, mapping resources, logon scripts, patch management, updates, auditing, analysis and assessment.
  • Create a policy or procedure that addresses events such as: a disaster recovery plan, a business continuity plan, incident response policy, acceptable usage document, information security policy, physical security policy, assessments or troubleshooting procedures.
  • Develop a research report or implementation plan concerning legal and ethical best practices and mandated requirements that pertain to information security.
  • Research, document, test and evaluate several current industry information security based threats, risks, malicious activities, covert methodology, encryption technologies, mitigation techniques or unconventional tactics to prevent loss of sensitive information and data confidentiality, integrity and availability.

Network Security Program Information

  • Program Credits: 120
  • Major Credits: 36

Requirements to graduate include a 2.0 CGPA, completed required coursework, Portfolio, Internship, and a Student Innovation Project.

For a more detailed breakout of completion time frames and rates, please see the UAT Fast Facts page.

From the Cyber Security Blog

    UAT Cyber Security students at Black Hat

    Cyber Security Students Garner Industry Experience Working Hacker Conventions in Las Vegas

    The iconic Black Hat and DEF CON Conventions took over Vegas the week of July 30- Aug. 7, bringing swarms of hackers, from industry and other realms. Attendees ...

    Read full entry »

    08.16.16 | Cyber Security Expert | 0 comments
    DEFCON Hacking Conference

    DEF CON 24

    DEF CON is one of the oldest and largest continuously running hacker conventions, which seems to continue growing each year. UAT will make its usual rounds at DEF CON to connect with alumni as well as many like minded technology-driven ...

    Read full entry »

    07.06.16 | Cyber Security Expert | 0 comments
    Black Hat

    16 Black Hat Briefings Conference

    UAT Cyber Security students will return to Black Hat in a few weeks to serve as paid volunteers assisting with various activities at the conference such as network set up, security, event organization and tear down. Year after year,

    Read full entry »

    07.05.16 | Cyber Security Expert | 0 comments

Online Network Security Disclosure

At University of Advancing Technology, we believe that students and families should be prepared financially for college and understand employment opportunities prior to starting any program. In an effort to ensure you have the information you need to make informed choices on program cost, medial loan debt incurred by students who completed the program, on-time completion rates, and the occupations this program prepares you to enter, the Department of Education has instituted the following disclosure template.* For more information, click on the respective academic level.

UAT Accreditation and Recognition