BACHELOR OF SCIENCE
NETWORK SECURITY DEGREE
ATTACK AND DEFEND DIGITAL DATA NETWORKS TO
DETECT AND PREVENT THEFT OR CORRUPTION
FACULTY VIDEO - COVERT CHANNELS
Russ Rogers has been an Arabic linguist with the U.S. Air Force, co-founder and former
CEO of Security Horizon, author or editor of 11 books on information security, and a
senior organizer of the DEFCON hacker conference. For the last several years, he has
been the Professor of Network Security for UAT. Russ speaks at security conferences
around the world, including in Tokyo, Singapore, Amsterdam, and Sao Paulo, Brazil.
Professor teaching both on campus and
online specializing in Information
Security and Assurance...
Professor teaching both on campus and
online who has been involved in the
information security and...
Provide your information below and an Enrollment Advisor will contact
you shortly to answer your questions about UAT and the Network Security program.
Required Fields Are Highlighted
As technology continues its speed-of-light evolution, becoming ever more
pervasive in commerce and culture, the theft and corruption of information
expands as well. This leading edge program is designed around the contemporary
skills and advanced industry-standard tools associated with security for
information network technology initiatives. UAT has been designated as a Center
for Academic Excellence in Information Systems Security Education by the US
National Security Agency. Recognized by industry and government alike, UAT's
B.S. in Network Security (NTS) – over a decade in development -- is one of the
most prestigious programs in the country.
UAT's Cyber Security blog
Students develop a comprehensive understanding of every aspect of creating, maintaining
and defending secure networks. Students will learn to design networks using diagrams and
documentation to provide communication within an organization, as well as to the outside
world, via the Internet.
Learn about industry standards and regulations that have already been defined, as well as
those that are still evolving. Students learn to develop the documentation that provides
the foundation for network security programs.
Network security, as a topic area, includes a large number of tasks that can be automated
through the use of custom-made programs and scripts. UAT NTS students learn how to create
these programs and scripts to automate their own security processes.
Students learn about a variety of software types used in network security to test for
flaws on devices such as computers and servers. Students practice using software that
helps detect vulnerabilities, identify all the possible ways a particular computer can
communicate on a network, how each computer is configured, and whether it's secure or not.
UAT's NTS students don't just learn to analyze the security of an organization, but also
how to communicate to an organization how to fix the issues that have been found. This
includes both written and verbal communication.
Students are taught to use critical thinking skills to research current security trends and
look for areas that might have been overlooked and pose a danger to computer networks. The
goal is to help locate security problems before the bad guys do, and protect against them.
Semesters to completion:
Requirements to graduate include a 2.0 CGPA, completed required coursework, Portfolio, Internship, and
a Student Innovation Project.
For a more detailed breakout of completion time frames and rates, please see the
UAT FAST FACTS page.
POSITIONS OUR GRADUATES HAVE TAKEN
- Cyber Security Lab Administrator – Department of Defense
- Security Support Specialist – Alert Logic Inc
- Systems Administrator – Boeing Inc
- Network Security Administrator – National Security Agency
- Enterprise Information Security Architect - Motorola
COMPANIES HIRING OUR STUDENT INTERNS
- National Security Agency
- Effortless 24/7
- Boeing, Inc.
- Fabiano Communications
NETWORK SECURITY MAJOR DISCLOSURE
At University of Advancing Technology, we believe that students and families should be prepared financially for college and understand employment opportunities prior to starting any program. In an effort to ensure you have the information you need to make informed choices on program cost, medial loan debt incurred by students who completed the program, on-time completion rates, and the occupations this program prepares you to enter, the Department of Education has instituted the following disclosure template. For more information, click on the respective academic level below:
brings over 18 years of technology, education, and management experience
designing, developing and educating in the next generation of Information Assurance industry
defenders. Professor Keating serves as the Network Security Program Coordinator at the
University of Advancing Technology, creating and maintaining the health of the curriculum
and the partnerships to industry and government. A love for all technology blossomed into a
BS in Technology and an MS in Information Technology.
A Ph.D. in Business Administration with a specialization in Computer Information Security ETA
is TBD 2013.
Professor Keating is a board member for The Colloquium for Information Systems Security
Education (CISSE) and the Technology Editor for the Journal of Advancing Technology. She
has lectured and published on various security topics including Social Media, Digital
Footprint, Superior Information Assurance Workforce, Information Security Practice and
Ethics, Social Engineering and Penetration Testing. Professor Keating has sat as a chairperson
on over twenty UAT's Masters of Science in Information Assurance Thesis and holds the following
Microsoft, CISCO, and CompTIA industry certifications. Professor Keating maintains UAT's status
for the Committee on National Security Systems(CNSS) curriculum standards and the National
Centers of Academic Excellence in Information Assurance Education Program.
I have been a full time Professor at the University of Advancing Technology (UAT) since January
of 2002. Teaching a variety of Microsoft certification courses through the Professional
Development Center and degreed courses in UAT’s Network Engineering and Security programs.
Prior to UAT, I had a distinguished 20-year career in the United States Air Force. During the
first 12 years or so I worked as a jet engine mechanic on a variety of aircraft. Getting my
hands dirty. While the rest of my career I worked in Field Training as a Master Aircraft
Trainer, delivering technical training course on F-15 & F16 aircraft engines.
During my last tour in the US Air Force (Nellis AFB, NV), I was assigned the additional duty of
Security Officer. During the late 80’s, these duties would encompass Physical (OPSEC),
Telecommunication (COMSEC), and Computer (INFOSEC) security.
The concept of information assurance was a new field for the military. Data that was stored
on the hard drives or floppies was thought safe as long as you had good physical security.
The military’s focus concerning computers and telecommunication security was centered on
electronic emissions, a project code named TEMPEST.