header partial here
/NS
Network Security
bs

Home | Advancing Technology Degrees | Network Security

Network Security Degree

University of Advancing Technology (UAT) is designated as a National Center of Academic Excellence in Cyber Defense (CAE-CD) by the National Security Agency (NSA).

Network security utilizes proactive techniques, including defense-in-depth and layered security, to mitigate or eliminate vulnerabilities in information systems and to protect against potential exploitation. This may include network and application penetration testing, software and hardware reverse engineering as well as developing exploits for identified vulnerabilities.

A network security specialist is a professional who focuses on ensuring information confidentiality, integrity and availability. Security professionals possess intimate knowledge of critical business components.

UAT's Network Security degree reflects the application of theory and is aligned with industry standards and guidelines. The program provides students with the opportunity to synthesize and apply the vital skills and knowledge necessary to succeed in the cyber security workforce.

1
2
3

Request Info

Provide your information below and an Admissions Advisor will contact you shortly to answer your questions about UAT and your advancing technology degree program of interest.

 
 
Next
Previous
 
Next
University of Advancing Technology (UAT) is pleased to provide you with additional information about the college and its programs. By hitting submit, you give us permission to use either direct-dialed, autodialed and/or pre-recorded telemarketing to call or text you at the phone number you provided. Please note that such consent is not required to attend UAT.
Previous
 
Submit
View full size

NETWORK SECURITY DEGREE OBJECTIVES

  • Create a network infrastructure design communications document that includes identified hardware components, connections to the outside world, identified physical layer connectivity (media) and addressing, including operational and security components in the design.
  • Install, configure and test security hardware and software tools with supporting documentation such as port scanners, vulnerability detection systems, intrusion detection systems, firewalls, system hardening, anti-virus tools, patch management, auditing and assessment.
  • Construct, implement and document a script or a program to automate a security-related process or other tasks such as installation, administration, management, mapping resources, logon scripts, patch management, updates, auditing, analysis and assessment.
  • Create a policy or procedure that addresses events such as: a disaster recovery plan, a business continuity plan, an incident response policy, an acceptable usage document, an information security policy, a physical security policy, assessments or troubleshooting procedures.
  • Develop a research report or implementation plan concerning legal and ethical best practices and mandated requirements that pertain to information security.
  • Research, document, test and evaluate several current industry information security-based threats, risks, malicious activities, covert methodology, encryption technologies, mitigation techniques or unconventional tactics to prevent loss of sensitive information and data confidentiality, integrity and availability.

Meet our skilled faculty

Educating the next wave of innovators, our faculty leverage their experiences to mentor students to lead innovations and solve challenges in advancing technology.

EXPLORE OUR DEGREES
Synchronic Learning: superior graduates, mentored education, flexible Syncflex learning.

WHY UAT?

UAT’s Synchronic Learning model provides an education framework that prepares superior graduates to become tomorrow’s innovators. This model embodies UAT’s methodologies, curricula and community dedicated to fostering an environment of innovation that promotes demonstrated mastery and job readiness.

How does UAT prepare superior graduates? Students are required to participate in projects that solve real problems. UAT requires students to innovate and create a working proof of concept that’s never been done before. Students complete internships, community projects and apprenticeship experiences to cultivate their ability to succeed in the workplace.

LEARN MORE

WANT TO EARN THIS DEGREE ONLINE?

FROM THE UAT TECH BLOG

FOLLOW US!

Secure Our World: Simple Steps for Cyber Safety

October marks Cybersecurity Awareness Month, a time to focus on securing our digital lives. The[...]

Revisiting Innovations with H@xc0rd

From the University of Advancing Technology’s (UAT) humble beginnings in the 1980s to its present-day status as an innovation hub, many [...]


Commencement Ceremony


Filing the Arizona STEM Pipeline

UAT Accreditation and Recognition

nsa

Network Security curriculum certified by the US National Security Agency's Information Assurance Courseware Evaluation program

cae