header partial here
/NS
Network Security
bs

Network Security Degree

University of Advancing Technology (UAT) is a designated Center of Academic Excellence - Cyber Defense Education (CAE-CDE) institution through the National Information Assurance Education Training Program (NIETP). Sponsored by the National Security Agency (NSA) and the Department of Homeland Security (DHS), NIETP operates under national authority as the national manager for cyber defense education and training relating to national security systems.

Network security utilizes proactive techniques, including defense-in-depth and layered security, to mitigate or eliminate vulnerabilities in information systems and to protect against potential exploitation. This may include network and application penetration testing, software and hardware reverse engineering as well as developing exploits for identified vulnerabilities.

A network security specialist is a professional who focuses on ensuring information confidentiality, integrity and availability. Security professionals possess intimate knowledge of critical business components.

UAT's Network Security degree reflects the application of theory and is aligned with industry standards and guidelines. The program provides students with the opportunity to synthesize and apply the vital skills and knowledge necessary to succeed in the cyber security workforce.

1
2
3

INTERESTED IN LEARNING MORE?

Provide us with your information below and an Admissions Advisor will contact you shortly to answer your questions.

 
 
Next
Previous
 
Next
University of Advancing Technology (UAT) is pleased to provide you with additional information about the college and its programs. By hitting submit, you give us permission to use either direct-dialed, autodialed and/or pre-recorded telemarketing to call or text you at the phone number you provided. Please note that such consent is not required to attend UAT.
Previous
 
Submit
View full size

NETWORK SECURITY DEGREE OBJECTIVES

  • Create a network infrastructure design communications document that includes identified hardware components, connections to the outside world, identified physical layer connectivity (media) and addressing, including operational and security components in the design.
  • Install, configure and test security hardware and software tools with supporting documentation such as port scanners, vulnerability detection systems, intrusion detection systems, firewalls, system hardening, anti-virus tools, patch management, auditing and assessment.
  • Construct, implement and document a script or a program to automate a security-related process or other tasks such as installation, administration, management, mapping resources, logon scripts, patch management, updates, auditing, analysis and assessment.
  • Create a policy or procedure that addresses events such as: a disaster recovery plan, a business continuity plan, an incident response policy, an acceptable usage document, an information security policy, a physical security policy, assessments or troubleshooting procedures.
  • Develop a research report or implementation plan concerning legal and ethical best practices and mandated requirements that pertain to information security.
  • Research, document, test and evaluate several current industry information security-based threats, risks, malicious activities, covert methodology, encryption technologies, mitigation techniques or unconventional tactics to prevent loss of sensitive information and data confidentiality, integrity and availability.

Meet our skilled faculty

Educating the next wave of innovators, our faculty leverage their experiences to mentor students to lead innovations and solve challenges in advancing technology.

EXPLORE OUR DEGREES
Synchronic Learning: superior graduates, mentored education, flexible Syncflex learning.

WHY UAT?

UAT’s Synchronic Learning model provides an education framework that prepares superior graduates to become tomorrow’s innovators. This model embodies UAT’s methodologies, curricula and community dedicated to fostering an environment of innovation that promotes demonstrated mastery and job readiness.

How does UAT prepare superior graduates? Students are required to participate in projects that solve real problems. UAT requires students to innovate and create a working proof of concept that’s never been done before. Students complete internships, community projects and apprenticeship experiences to cultivate their ability to succeed in the workplace.

LEARN MORE

WANT TO EARN THIS DEGREE ONLINE?

FROM THE UAT TECH BLOG

FOLLOW US!

A Network Security Degree: Requirements, Expectations and Applications

It’s no secret that the more technologically advanced our world gets, the more we have to participate in it. This is great for connecting people worldwide and maximizing availability, but it[...]

Life Saving Skills Learned at C2 Event

Training for Situations, Hoping They Never Happen On Monday, May 16, 2022, UAT[...]

What is a Text Editor?

How to Do Serious Systems Admin Work The Word Processor is an amazing piece of technology that has[...]


Commencement Ceremony


Filing the Arizona STEM Pipeline

UAT Accreditation and Recognition

homeland security

Approved by the Student and Exchange Visitor Information Systems (SEVIS) for training of foreign students

nsa

Network Security curriculum certified by the US National Security Agency's Information Assurance Courseware Evaluation program