Cybersecurity and NetworksBachelor of Science

Would you like to make the internet a safer place for generations to come? Do you have a competitive spirt? If so, you should consider a career in cybersecurity, a field that by 2021 will have 3.5 million unfulfilled positions in cybersecurity worldwide, according to Cybersecurity Ventures. We will prepare you to excel in this high-growth industry.

Be the go-to person that companies depend on

The University of New Haven's cybersecurity and networks program is one of the best in the country. Its research, program offerings, multidisciplinary approach, and performance in cyber competitions, among other factors, led to the University being designated as a National Center of Academic Excellence in Cyber Operations (CAE-CO) by the National Security Agency. The University is one of only two schools in New England – and 21 in the country – to earn this distinction.

NSA logoCAE logo

 

The cybersecurity industry is expected to reach $170 billion by 2020. By 2021, there are expected to be 3.5 million unfilled positions in cybersecurity worldwide. It is impossible to overstate the importance of cybersecurity and network technology to businesses, industries, and government organizations. If their systems and programs don’t run smoothly, business and administration can be slow or even grind to a halt and the financial cost can be devastating. Our program will give you a solid understanding of both practical and conceptual cybersecurity and network technologies, including computer hardware, software, and design issues.

Students take hands-on courses related to networking, network defense, cybersecurity, cyber forensics, mobile device forensics and exploitation, and reverse engineering. Our students are also involved in conducting leading-edge research in cybersecurity, cyber forensics and networking, even as undergraduates.

Our students are in high demand upon graduation, and have been offered opportunities by organizations such as MITRE, Accenture, IBM, Intel, and NTT security.

Explore all areas of the field

The Cybersecurity and Networks program will take you into areas such as network design, network administration, network security, and cyber forensics. You also will have an opportunity to complete a minor in a field that partners superbly with information technology — criminal justice and business, for example. Interested in going on to graduate school? This program prepares you for masters programs in national security, network systems, and computer science.

Visualize your career path

What would your job title be? Starting out, you could be a network technician, applications developer, biomedical computing technician, or network security technician. With some years of job experience, think: network administrator or security manager. Our alumni work for companies large and small, school systems, and government agencies.

See More See Less

Learn from professors who are dedicated to your success.

Our faculty are leaders and innovators in their fields, bringing both deep professional experience and academic rigor to the classroom.

Full Tuition Scholarship Opportunity
Cybercorps logo

CyberCorps® Scholarship for Service (SFS) Program

The Scholarship for Service (SFS) Program is designed to recruit and train the next generation of cybersecurity professionals to meet the needs of Federal, State, local, and tribal government. This program provides scholarships for cybersecurity undergraduate and graduate education, funded through grants awarded by the National Science Foundation (NSF). In return for the financial support, recipients must agree to work for the U.S. Government after graduation in a cybersecurity-related position, for a period equal to the length of the scholarship.

Learn More
Envision Your Future

The information below is designed to show the many possible careers you could pursue with your major. The research is provided by Encoura, the leading research and advisory firm focused exclusively on higher education. It includes median national salaries and industry growth projections over the next decade. Click here to view the full report.

$135K

Director IT Risk Management

16% Growth 2017-2027

$92K

Firewall Engineer

17% Growth 2017-2027

$84K

Database Administrator

12% Growth 2017-2027

Selected Courses and Programs
  • Introduction to Cyber Forensic Science

    This course provides students with the basic theoretical and practical foundations necessary for the investigation of computer related or computer-assisted crimes. The discipline of cyber forensic science will be discussed and outlined with emphasis on the sub-discipline of computer forensics. Students will learn the basics of acquiring digital evidence from storage media, authenticating the digital evidence, and analyzing it. Topics include: deleted file recovery, anti-forensics, rules of evidence, law as it relates to computer crime, computer crime scene search and seizure, memory forensics, introduction to file systems, e-mail forensics, and network forensics.

  • Ethical Hacking

    The purpose of this course is to introduce students to the exciting world of Ethical Hacking (a.k.a. system penetration) tools and techniques, which have become commonly used by system administrators and networking specialists to secure their systems. The goal of this course is to expose students to groundbreaking methodologies in conducting thorough information security analysis as well as advanced penetration-testing techniques. Students taking this course will be able to perform intensive assessments required to effectively identify, exploit and mitigate risks to the security of the organization's infrastructure. More precisely, it will be hands-on where students will use up to date tools like Kali-Linux and Metasploit. Students may also be required to implement their own prototypes or reproduce exploits.

  • Network Essentials and Technologies

    A foundation in current network technologies for local area networks (LANs), wide area networks (WANs), and the Internet. Introduction to the hardware, software, terminology, components, design, and connections of a network. The OSI model will be covered as well as differing topologies and protocols for LANs.

  • Reverse Engineering

    This very hands-on course focuses on reverse engineering of software applications (e.g., Android applications, Windows Executables) which is an essential technique for both defenders and attackers in the cyberspace. Students will work on different platforms, learn about the typical architecture, analyze traditional software/Apps/malware, may crack/manipulate existing software, use debuggers and work on byte code.

  • Small Scale Digital Device Forensics

    The theoretical and practical foundations necessary for the investigation of small scale digital devices (SSDDs). SSDDs include mobile phones, smartphones, tablets and BlackBerry, and any device that could potentially fit in your pocket, and their respective operating systems such as Android and iOS. Topics include: bagging and tagging SSDDs, logical and physical acquisition of SSDDs, analysis of SSDDs, authentication of SSDD evidence, evidence reconstruction, the various operating systems on SSDDs, SSDD ontology, and application artifacts found on SSDDs.

  • Memory Forensics

    This course provides students with the basic theoretical and practical foundations necessary for the investigation of volatile memory. The discipline of digital forensics will be discussed and outlined with emphasis on the sub-discipline of memory forensics. Students will learn the basics of acquiring digital evidence from volatile memory and analyzing it.

  • Intermediate Programming in C/C++

    Further topics in the C programming language. Problem-solving methods, algorithm development, and good programming style. Pointers, strings, structured data, two-dimensional arrays, files, recursion, dynamic memory allocation, parameter passing mechanisms, and the use of pointers to process arrays and lists. Basic algorithms for searching, sorting, and simple numerical analysis. Programming assignments will include both numeric and non-numeric applications.

  • Python Programming

    Techniques and tools for developing simple scripts in Python. It introduces Python by a comparative approach and explores the Python libraries and their applications to varied tasks. Individual scripting projects will be assigned.

  • Full List of Courses for Cybersecurity and Networks

    The University of New Haven offers a wide variety of in-depth courses that create a transformational educational experience for our students. To view the complete list of courses you'll take while pursuing a Bachelor of Science in Cybersecurity and Networks, check out the Academic Catalog:

    Cybersecurity and Networks, B.S.

Charger Advantage

Get an inside look at what differentiates the University of New Haven and how your experiences as a student will prepare you for success.

Nationally Recognized Center for Career Development

All University of New Haven students have access to the many resources available through the University’s Career Development Center, which has been named one of the best in the nation by The Princeton Review.

From career assessments, networking, and job shadowing to on-campus interviews and salary negotiation, the Career Development Center provides the skills and connections to identify a meaningful career and an opportunity to pursue your passion.

Learn More
Awards
Best Colleges logo

U.S. News & World Report Best Colleges - Engineering Programs

The University’s Tagliatela College of Engineering is again rated in the top third in its category (institutions that do not offer a doctorate in engineering).

Learn More
Upcoming Events

Sunday, December 8, 2019

Saturday, December 14, 2019

Saturday, January 11, 2020

Next Steps
  • Admission Requirements

    Whether you're still in high school or are transferring from another college, we offer full- and part-time opportunities for undergraduates from inside the U.S. and abroad. The admission process can begin as early as the end of your high school junior year.

    The Application Process

  • Financial Aid Opportunities

    We offer a comprehensive financial aid program, with students receiving assistance in the form of grants, scholarships, student loans, and part-time employment. Funds are available from federal and state governments, private sponsors, and from university resources. More than 85 percent of the University's full-time undergraduate students receive some form of financial assistance.

    Learn More