Bachelor of Science In Cybersecurity and Networks

Would you like to make the internet a safer place for generations to come? Do you have a competitive spirit? If so, you should consider a career in cybersecurity, a field that by 2021 will have 3.5 million unfulfilled positions in cybersecurity worldwide, according to Cybersecurity Ventures. We will prepare you to excel in this high-growth industry.

Be the go-to person that companies depend on

The University of New Haven's cybersecurity and networks program is one of the best in the country. Its research, program offerings, multidisciplinary approach, and performance in cyber competitions, among other factors, led to the University being designated as a National Center of Academic Excellence in Cyber Operations (CAE-CO) by the National Security Agency. The University is one of only two schools in New England – and 21 in the country – to earn this distinction.

NSA logo CAE logo


The cybersecurity industry is expected to reach $170 billion by 2020. By 2021, there are expected to be 3.5 million unfilled positions in cybersecurity worldwide. It is impossible to overstate the importance of cybersecurity and network technology to businesses, industries, and government organizations. If their systems and programs don’t run smoothly, business and administration can be slow or even grind to a halt and the financial cost can be devastating. Our program will give you a solid understanding of both practical and conceptual cybersecurity and network technologies, including computer hardware, software, and design issues.

Students take hands-on courses related to networking, network defense, cybersecurity, cyber forensics, mobile device forensics and exploitation, and reverse engineering. Our students are also involved in conducting leading-edge research in cybersecurity, cyber forensics and networking, even as undergraduates.

Our students are in high demand upon graduation, and have been offered opportunities by organizations such as MITRE, Accenture, IBM, Intel, and NTT security.

Explore all areas of the field

The Cybersecurity and Networks program will take you into areas such as network design, network administration, network security, and cyber forensics. You also will have an opportunity to complete a minor in a field that partners superbly with information technology — criminal justice and business, for example. Interested in going on to graduate school? This program prepares you for masters programs in national security, network systems, and computer science.

Visualize your career path

What would your job title be? Starting out, you could be a network technician, applications developer, biomedical computing technician, or network security technician. With some years of job experience, think: network administrator or security manager. Our alumni work for companies large and small, school systems, and government agencies.

Learn from professors who are dedicated to your success.

Our faculty are leaders and innovators in their fields, bringing both deep professional experience and academic rigor to the classroom.

Full Tuition Scholarship Opportunity
Cybercorps logo

CyberCorps® Scholarship for Service (SFS) Program

The Scholarship for Service (SFS) Program is designed to recruit and train the next generation of cybersecurity professionals to meet the needs of Federal, State, local, and tribal government. This program provides scholarships for cybersecurity undergraduate and graduate education, funded through grants awarded by the National Science Foundation (NSF). In return for the financial support, recipients must agree to work for the U.S. Government after graduation in a cybersecurity-related position, for a period equal to the length of the scholarship.

Learn More

Envision Your Future

The information below is designed to show the many possible careers you could pursue with your major. The research is provided by Encoura, the leading research and advisory firm focused exclusively on higher education. It includes median national salaries and industry growth projections over the next decade. Click here to view the full report.


Director IT Risk Management

16% Growth 2017-2027


Firewall Engineer

17% Growth 2017-2027


Database Administrator

12% Growth 2017-2027

Selected Courses and Programs
  • This course provides students with the basic theoretical and practical foundations necessary for the investigation of computer related or computer-assisted crimes. The discipline of cyber forensic science will be discussed and outlined with emphasis on the sub-discipline of computer forensics. Students will learn the basics of acquiring digital evidence from storage media, authenticating the digital evidence, and analyzing it. Topics include: deleted file recovery, anti-forensics, rules of evidence, law as it relates to computer crime, computer crime scene search and seizure, memory forensics, introduction to file systems, e-mail forensics, and network forensics.

  • The purpose of this course is to introduce students to the exciting world of Ethical Hacking (a.k.a. system penetration) tools and techniques, which have become commonly used by system administrators and networking specialists to secure their systems. The goal of this course is to expose students to groundbreaking methodologies in conducting thorough information security analysis as well as advanced penetration-testing techniques. Students taking this course will be able to perform intensive assessments required to effectively identify, exploit and mitigate risks to the security of the organization's infrastructure. More precisely, it will be hands-on where students will use up to date tools like Kali-Linux and Metasploit. Students may also be required to implement their own prototypes or reproduce exploits.

  • A foundation in current network technologies for local area networks (LANs), wide area networks (WANs), and the Internet. Introduction to the hardware, software, terminology, components, design, and connections of a network. The OSI model will be covered as well as differing topologies and protocols for LANs.

  • This very hands-on course focuses on reverse engineering of software applications (e.g., Android applications, Windows Executables) which is an essential technique for both defenders and attackers in the cyberspace. Students will work on different platforms, learn about the typical architecture, analyze traditional software/Apps/malware, may crack/manipulate existing software, use debuggers and work on byte code.

  • The theoretical and practical foundations necessary for the investigation of small scale digital devices (SSDDs). SSDDs include mobile phones, smartphones, tablets and BlackBerry, and any device that could potentially fit in your pocket, and their respective operating systems such as Android and iOS. Topics include: bagging and tagging SSDDs, logical and physical acquisition of SSDDs, analysis of SSDDs, authentication of SSDD evidence, evidence reconstruction, the various operating systems on SSDDs, SSDD ontology, and application artifacts found on SSDDs.

  • This course provides students with the basic theoretical and practical foundations necessary for the investigation of volatile memory. The discipline of digital forensics will be discussed and outlined with emphasis on the sub-discipline of memory forensics. Students will learn the basics of acquiring digital evidence from volatile memory and analyzing it.

  • Further topics in the C programming language. Problem-solving methods, algorithm development, and good programming style. Pointers, strings, structured data, two-dimensional arrays, files, recursion, dynamic memory allocation, parameter passing mechanisms, and the use of pointers to process arrays and lists. Basic algorithms for searching, sorting, and simple numerical analysis. Programming assignments will include both numeric and non-numeric applications.

  • Techniques and tools for developing simple scripts in Python. It introduces Python by a comparative approach and explores the Python libraries and their applications to varied tasks. Individual scripting projects will be assigned.

  • The University of New Haven offers a wide variety of in-depth courses that create a transformational educational experience for our students. To view the complete list of courses you'll take while pursuing a Bachelor of Science in Cybersecurity and Networks, check out the Academic Catalog:

    Cybersecurity and Networks, B.S.

    Information Technology Minor

Learn about earning college credit through Project Lead the Way.

Charger Advantage

Get an inside look at what differentiates the University of New Haven and how your experiences as a student will prepare you for success.

Nationally Recognized Center for Career Development

All University of New Haven students have access to the many resources available through the University’s Career Development Center, which has been named one of the best in the nation by The Princeton Review.

From career assessments, networking, and job shadowing to on-campus interviews and salary negotiation, the Career Development Center provides the skills and connections to identify a meaningful career and an opportunity to pursue your passion.

Learn More

ASEE Diversity Recognition Program - Bronze Level

For its diversity, equity and inclusion efforts the Tagliatela College of Engineering has been recognized at the Bronze Level by the American Society of Engineering Education's Diversity Recognition Program.

Learn More
Best Colleges logo

U.S. News & World Report  Best Colleges - Engineering Programs

The University’s Tagliatela College of Engineering is again rated in the top third in its category (institutions that do not offer a doctorate in engineering).

Learn More

Upcoming Events

There are a variety of opportunities for you to learn more about our programs, what it is like to be a student here, and the scholarships, assistantships and financial aid that we offer. Whether you want to meet us on campus or online, we have something for you.

Next Steps
  • Whether you're still in high school or are transferring from another college, we offer full- and part-time opportunities for undergraduates from inside the U.S. and abroad. The admission process can begin as early as the end of your high school junior year.

    The Application Process

  • We offer a comprehensive financial aid program, with students receiving assistance in the form of grants, scholarships, student loans, and part-time employment. Funds are available from federal and state governments, private sponsors, and from university resources. More than 85 percent of the University's full-time undergraduate students receive some form of financial assistance.

    Learn More