header partial here
/NS
Network Security
bs

Home | Advancing Technology Degrees | Network Security

Network Security Degree

University of Advancing Technology (UAT) is designated as a National Center of Academic Excellence in Cyber Defense (CAE-CD) by the National Security Agency (NSA).

Network security utilizes proactive techniques, including defense-in-depth and layered security, to mitigate or eliminate vulnerabilities in information systems and to protect against potential exploitation. This may include network and application penetration testing, software and hardware reverse engineering as well as developing exploits for identified vulnerabilities.

A network security specialist is a professional who focuses on ensuring information confidentiality, integrity and availability. Security professionals possess intimate knowledge of critical business components.

UAT's Network Security degree reflects the application of theory and is aligned with industry standards and guidelines. The program provides students with the opportunity to synthesize and apply the vital skills and knowledge necessary to succeed in the cyber security workforce.

1
2
3

Request Info

Provide your information below and an Admissions Advisor will contact you shortly to answer your questions about UAT and your advancing technology degree of interest.

 
 
Next
Previous
 
Next
University of Advancing Technology (UAT) is pleased to provide you with additional information about the college and its programs. By hitting submit, you give us permission to use either direct-dialed, autodialed and/or pre-recorded telemarketing to call or text you at the phone number you provided. Please note that such consent is not required to attend UAT.
Previous
 
Submit
View full size

NETWORK SECURITY DEGREE OBJECTIVES

  • Create a network infrastructure design communications document that includes identified hardware components, connections to the outside world, identified physical layer connectivity (media) and addressing, including operational and security components in the design.
  • Install, configure and test security hardware and software tools with supporting documentation such as port scanners, vulnerability detection systems, intrusion detection systems, firewalls, system hardening, anti-virus tools, patch management, auditing and assessment.
  • Construct, implement and document a script or a program to automate a security-related process or other tasks such as installation, administration, management, mapping resources, logon scripts, patch management, updates, auditing, analysis and assessment.
  • Create a policy or procedure that addresses events such as: a disaster recovery plan, a business continuity plan, an incident response policy, an acceptable usage document, an information security policy, a physical security policy, assessments or troubleshooting procedures.
  • Develop a research report or implementation plan concerning legal and ethical best practices and mandated requirements that pertain to information security.
  • Research, document, test and evaluate several current industry information security-based threats, risks, malicious activities, covert methodology, encryption technologies, mitigation techniques or unconventional tactics to prevent loss of sensitive information and data confidentiality, integrity and availability.

Curriculum Sneak Peek


Power-Up Your Education with our Evolving Course Lineup

Check out some of this semester’s Network Security courses and gear up for fresh challenges. Unlock new skills and power up your education.

FEATURED COURSES:

NTS305: Information Governance

As the front line of the 21st century information age will you be managing information appropriately while considering the threats you face? Information is managed by a wide range of elements that must be considered as part of the full equation. The laws and regulations that apply to the business, the importance placed on the information by business leadership, the expectations of the customer, and of course the desire for the most reasonable protections to the information in support of all objectives. This course focuses on how all these elements come together to create and manage the information governance of the organization.

NTS350: Network Security Monitoring

Explore the world of Network Security Monitoring (NSM) and packet analysis. Network security monitoring takes a step past standard intrusion detection models and collects the full spectrum of data types (event, session, full content and statistical) needed to identify and validate intrusions on contemporary network infrastructures. This course will examine typical network security monitoring hardware, tools, design and deployment. Standard vulnerability packet analysis scenarios will provide an in-depth appreciation of monitoring corporate-level networking environments.

NTS442: Collegiate Cyber Defense Competition

This course prepares students for a competition that specifically focuses on the operational aspect of managing and protecting an existing commercial network infrastructure. Not only do students get a chance to test their knowledge in an operational environment, they will also get a chance to network with industry professionals. Due to the changing nature of the challenges, this course can be taken twice and credits received both times toward the appropriate degree.

NTW220: Linux I for Technologists

This course provides an overview of the commands, utilities and supporting architecture used in Linux operating systems. This course provides the student with skills such as system and application installation, shell scripting, regular expressions, system management, web services installation and maintenance.

NTW245: Applied Mobile Computing and Cloud Collaboration Technologies

This course will provide students with an understanding of the modern mobile computing technology landscape. The explosive growth in this area makes this essential knowledge for the IT engineer to have. Wireless fundamentals and history will be covered. Popular topics such as how to manage smartphones, tablets and other mobile consumer devices in a business environment and how service providers architect their wireless networks to accommodate mobile devices will be covered. Wireless technologies such as GSM, CDMA, 3G/4G, LTE, 802.11, Bluetooth and WiMAX will be introduced. Students will learn the various wireless and collaboration technologies influencing modern corporations and service providers. This course will also explore the types, uses and configuration of on-demand collaboration, solutions email systems, file sharing, web publishing, web portals, content management solutions, online meeting, instant messengers, web-based word processor, spreadsheet, presentation and data storage services. During this course, you will learn the business drivers, social drivers and technology being used to mobilize the collaborative workforce. The trend towards consumerization of IT will also be discussed. A study of these technologies will prepare students to make objective evaluations of the different wireless/mobile and collaboration technologies and their use cases. Students will be given hands-on exercises to reinforce the knowledge taught in class.

NTW280: Virtualization System Technologies and Administration

This course will prepare students for working in the highly virtualized IT environments of contemporary businesses. The skills required to administer a typical Virtual Infrastructure will be covered in this class. The skills learned in this class will prepare you for understanding the design, implementation and tools used in a virtual environment. The course will focus on planning, implementing, configuring, deploying and securing server and network virtualization server and desktop technologies for software-as-a-service (SaaS), cloud computing technologies, administering virtualized server infrastructure, resource and balancing management, virtual switching, routing and forwarding, logical storage partitions, virtual processors, network interfaces, virtual and remote management of virtualized operating systems in a vendor-neutral environment. Each student will complete a hands-on project to build a complete multi-server VMware environment using the tools explored in this class. Students will be taught the business drivers, pros and cons and use cases of virtualization technology.

Meet our skilled faculty

Educating the next wave of innovators, our faculty leverage their experiences to mentor students to lead innovations and solve challenges in advancing technology.

EXPLORE OUR DEGREES
Synchronic Learning: superior graduates, mentored education, flexible Syncflex learning.

WHY UAT?

UAT’s Synchronic Learning model provides an education framework that prepares superior graduates to become tomorrow’s innovators. This model embodies UAT’s methodologies, curricula and community dedicated to fostering an environment of innovation that promotes demonstrated mastery and job readiness.

How does UAT prepare superior graduates? Students are required to participate in projects that solve real problems. UAT requires students to innovate and create a working proof of concept that’s never been done before. Students complete internships, community projects and apprenticeship experiences to cultivate their ability to succeed in the workplace.

LEARN MORE

WANT TO EARN THIS DEGREE ONLINE?

FROM THE UAT TECH BLOG

FOLLOW US!

Fifth Day of Techmas: Five Cybersecurity Facts

As the Twelve Days of Techmas continue at University of Advancing[...]

Honoring Veterans at UAT: A Tribute to Service, Education, and Innovation

  On this Veterans Day, we express our deepest gratitude for the immense contributions veterans make to our country,[...]

Secure Our World: Simple Steps for Cyber Safety

October marks Cybersecurity Awareness Month, a time to focus on securing our digital lives. The[...]


Commencement Ceremony


Filing the Arizona STEM Pipeline

UAT Accreditation and Recognition

nsa

Network Security curriculum certified by the US National Security Agency's Information Assurance Courseware Evaluation program

cae