Be the go-to person that companies depend on
The cybersecurity job market is projected to grow from $75 billion in 2015 to $170 billion by 2020. In 2016 alone, there were 1 million cybersecurity job openings. It is impossible to overstate the importance of cybersecurity and network technology to businesses, industries, and government organizations. If their systems and programs don’t run smoothly, business and administration can be slow or even grind to a halt and the financial cost can be devastating. Our program will give you a solid understanding of both practical and conceptual cybersecurity and network technologies, including computer hardware, software, and design issues.
Students take hands-on courses related to networking, network defense, cybersecurity, cyber forensics, mobile device forensics and exploitation, and reverse engineering. Our students are also involved in conducing leading-edge research in cybersecurity, cyber forensics and networking, even as undergraduates.
Our students are in high demand upon graduation, and have been offered opportunities by organizations such as MITRE, Accenture, IBM, Intel, and NTT security.
Explore all areas of the field
The Information Technology / Network Administration and Security program will take you into areas such as network design, network administration, network security, and cyber forensics. You also will have an opportunity to complete a minor in a field that partners superbly with information technology — criminal justice and business, for example. Interested in going on to graduate school? This program prepares you for masters programs in national security, network systems, and computer science.
Visualize your career path
What would your job title be? Starting out, you could be a network technician, applications developer, biomedical computing technician, or network security technician. With some years of job experience, think: network administrator or security manager. Our alumni work for companies large and small, school systems, and government agencies.
Please note: This program recently changed its name from Cyber Systems to Cybersecurity and Networks.
Learn from professors who are dedicated to your success.
Our faculty are leaders and innovators in their fields, bringing both deep professional experience and academic rigor to the classroom.
Envision Your Future
The information below is designed to show the many possible careers you could pursue with your major. The research is provided by Encoura, the leading research and advisory firm focused exclusively on higher education. It includes median national salaries and industry growth projections over the next decade. Click here to view the full report.
Director IT Risk Management
16% Growth 2017-2027
17% Growth 2017-2027
12% Growth 2017-2027
Selected Courses and Programs
Introduction to the Java programming language. Strings, arrays, and vectors. Object-oriented programming concepts including encapsulation, inheritance, and polymorphism. Applets and event-driven programming.
Modern operating system concepts including interrupts, process and thread management, concurrency, deadlock, memory management, file system management, resource allocation.
Characteristics of instruction set architecture (ISA) and microarchitecture; RISC and CISC ISA design; cache and memory hierarchy; physical and virtual memory; pipelining; branch prediction; project work in both ISA and microarchitecture implementation and design.
A foundation in current network technologies for local area networks (LANs), wide area networks (WANs), and the Internet. Introduction to the hardware, software, terminology, components, design, and connections of a network. The OSI model will be covered as well as differing topologies and protocols for LANs.
The University of New Haven offers a wide variety of in-depth courses that create a transformational educational experience for our students. To view the complete list of courses you'll take while pursuing a Bachelor of Science in Cybersecurity and Networks, check out the Academic Catalog:
Please note: This program recently changed its name from "Cyber Systems." The name change will be reflected in the 2018-2019 edition of the Academic Catalog.
THE CHARGER BLOG
Forensic Magazine, the leading forensic science magazine for experts working on criminal investigations, cited the University’s Artifact Genome Project to illustrate the growth in the use of digital forensic evidence.
U.S. News & World Report Best Colleges - Engineering Programs
The University moved up in the rankings of regional colleges in the north this year. It was also ranked in the top 50 nationally for both overall value and value for veterans. The Tagliatela College of Engineering is ranked among the top 75 engineering programs in its category.Learn More
Whether you're still in high school or are transferring from another college, we offer full- and part-time opportunities for undergraduates from inside the U.S. and abroad. The admission process can begin as early as the end of your high school junior year.
The Application Process
We offer a comprehensive financial aid program, with students receiving assistance in the form of grants, scholarships, student loans, and part-time employment. Funds are available from federal and state governments, private sponsors, and from university resources. More than 85 percent of the University's full-time undergraduate students receive some form of financial assistance.