Cybersecurity Bachelor's Degree

LEARNING, NETWORKING, AND CAREER OPPORTUNITIES

A Bachelor of Science (BS) in Cybersecurity (CSEC) graduate will understand the techniques used to compromise and infiltrate systems as well as the proven methods to protect data. The rise in cyber threats has created an unprecedented demand for cybersecurity specialists. Data breaches, malware infections, and software vulnerabilities are common in today's technology and it is critical to fully understand how these attacks occur, how to prevent them, and how to recover. The BS in CSEC degree includes courses in programming, data structures, operating systems, mathematics, wireless technologies, forensics and incident response, building secure software, cyber defense, and networking with a focus on theory and hands-on experience.

Cybersecurity is about protecting any and all components of an organization’s information network.  Threats and vulnerabilities can come from within and without the organization and cybersecurity professionals must understand the best practices for mitigation of these risks. This degree considers the various components of an information network that create vulnerabilities and risks, whether machine or human related. As a student of this degree, you will learn about the various threats and vulnerabilities found on an information network, the tools, techniques and technologies used to mitigate the vulnerabilities, and how to investigate breaches that occur on the network. Additionally, students will learn to develop and apply security plans and procedures based on common security standards for responding to cyber-attacks.

 

HANDS-ON LEARNING opportunities

  • Creating/building a local area network
  • Computer forensics via a virtual lab
  • Hands-on lab experience in the majority of courses including performing capture-the-flag hacking challenges in Cyber Defense I and Cyber Defense II to observe malicious activity
  • Learning to code using C++
  • Performing forensic analysis of system images in Forensics and Incident Responses
  • Programming Raspberry Pi computers with sensors and buttons in Programming Embedded Systems

 

SKILLS YOU WILL LEARN

  • Critical thinking
  • Logical thinking
  • Problem solving
  • Solution design
  • Analysis
  • Identifying and responding to malicious cyber activities
  • Group work
  • Learning collaboration in simulations of industry activity

Students living in states bordering Arkansas receive in-state tuition.

Financial Aid is available for those who qualify. The Arkansas Tech University school code to use on the FAFSA is 001089.

Payment Options:

  • Financial Aid
  • Payment Plan
  • Graduate Assistantships


Calculate Tuition

You could work as a(n):

  • Cybersecurity Engineer
  • Cybersecurity Specialist
  • Network security analyst
  • Penetration tester
  • Secure software developer
  • Security Architect
  • Security Engineer
  • Security Operations Center Analyst

Alumni of our program work at:

  • Large and small businesses
  • Schools and universities
  • Technology companies
 

View the links below to better understand the courses, the course timeline, and who your faculty will be when you enroll as an ATU student.

Credentials that stack with this degree:

  • Certifications including Certified Ethical Hacker (CEH), EnCase Certified Examiner (EnCE), and Certified Information Systems Security Professional (CISSP)
  • Master of Science in Cybersecurity
  • Master of Science in Information Technology

 

des
Point of Pride

Arkansas Tech University's Cybersecurity program is the first of its kind in the state of Arkansas.

IT'S TIME TO STEP UP

Find out how we will empower you to meet every challenge head-on.