Bachelor of Science In Cybersecurity

Would you like to make the internet a safer place for generations to come? Do you have a competitive spirit? If so, you should consider a career in cybersecurity, a field that by 2021 will have 3.5 million unfulfilled positions in cybersecurity worldwide, according to Cybersecurity Ventures. We will prepare you to excel in this high-growth industry.

Be the go-to person that companies depend on

The University of New Haven's Cybersecurity program is one of the best in the country. Its research, program offerings, multidisciplinary approach, and performance in cyber competitions, among other factors, led to the University being designated as a National Center of Academic Excellence in Cyber Operations (CAE-CO) by the National Security Agency. The University is one of only two schools in New England – and 21 in the country – to earn this distinction.

NSA logo

 

The cybersecurity industry is expected to reach $170 billion by 2020. By 2021, there are expected to be 3.5 million unfilled positions in cybersecurity worldwide. It is impossible to overstate the importance of cybersecurity and network technology to businesses, industries, and government organizations. If their systems and programs don’t run smoothly, business and administration can be slow or even grind to a halt and the financial cost can be devastating. Our program will give you a solid understanding of both practical and conceptual cybersecurity and network technologies, including computer hardware, software, and design issues.

Students take hands-on courses related to networking, network defense, cybersecurity, cyber forensics, mobile device forensics and exploitation, and reverse engineering. Our students are also involved in conducting leading-edge research in cybersecurity, cyber forensics and networking, even as undergraduates.

Our students are in high demand upon graduation, and have been offered opportunities by organizations such as MITRE, Accenture, IBM, Intel, and NTT security.

Explore all areas of the field

The Cybersecurity program will take you into areas such as network design, network administration, network security, and cyber forensics. You also will have an opportunity to complete a minor in a field that partners superbly with information technology — criminal justice and business, for example. Interested in going on to graduate school? This program prepares you for masters programs in national security, network systems, and computer science.

Visualize your career path

What would your job title be? Starting out, you could be a network technician, applications developer, biomedical computing technician, or network security technician. With some years of job experience, think: network administrator or security manager. Our alumni work for companies large and small, school systems, and government agencies.

Learn from professors who are dedicated to your success.

Our faculty are leaders and innovators in their fields, bringing both deep professional experience and academic rigor to the classroom.

Full Tuition Scholarship Opportunity
Cybercorps logo

CyberCorps® Scholarship for Service (SFS) Program

The Scholarship for Service (SFS) Program is designed to recruit and train the next generation of cybersecurity professionals to meet the needs of Federal, State, local, and tribal government. This program provides scholarships for cybersecurity undergraduate and graduate education, funded through grants awarded by the National Science Foundation (NSF). In return for the financial support, recipients must agree to work for the U.S. Government after graduation in a cybersecurity-related position, for a period equal to the length of the scholarship.

Learn More

Envision Your Future

The information below is designed to show the many possible careers you could pursue with your major. The research is provided by Encoura, the leading research and advisory firm focused exclusively on higher education. It includes median national salaries and industry growth projections over the next decade. Click here to view the full report.

$135K

Director IT Risk Management

16% Growth 2017-2027

$92K

Firewall Engineer

17% Growth 2017-2027

$84K

Database Administrator

12% Growth 2017-2027

Selected Courses and Programs
  • This course provides students with The basic theoretical and practical foundations necessary for the investigation of computer- related or computer-assisted crimes. The discipline of cyber forensic science will be discussed with emphasis on the sub-discipline of computer forensics. Students learn the basics of acquiring digital evidence from storage media, then authenticating and analyzing it. Topics include: deleted file recovery, anti-forensics, rules of evidence, law as it relates to computer crime, computer crime scene search and seizure, memory forensics, introduction to file systems, e-mail forensics, and network forensics.

  • This course introduces students to the exciting world of ethical hacking (a.k.a. system penetration) tools and techniques, which have become commonly used by system administrators and networking specialists to secure their systems. The goal of the course is to expose students to groundbreaking methodologies in conducting thorough information security analysis as well as advanced penetration-testing techniques. This course is deeply technical in nature. Students taking this course will be able to perform intensive assessments required to effectively identify, exploit, and mitigate risks to the security of the organization's infrastructure. More precisely, it will be hands-on where students will use up-to-date tools like Kali-Linux and Metasploit. Students may also be required to implement their own prototypes or reproduce exploits.

  • This course takes an in-depth look at network defense principles and techniques. It examines theoretical concepts behind designing and evaluating secure network operations, and devising and rationalizing best possible countermeasures against feasible threats.

  • This hands-on, deeply technical course focuses on reverse engineering of software applications (e.g., Android applications, Windows executables) which is an essential technique for both defenders and attackers in the cyberspace. Students will work on different platforms, learn about the typical architecture, analyze traditional software/apps/malware, may crack/manipulate existing software, use debuggers, and work on byte code.

  • The theoretical and practical foundations necessary for the investigation of small scale digital devices (SSDDs). SSDDs include mobile phones, smartphones, tablets and BlackBerry, and any device that could potentially fit in your pocket, and their respective operating systems such as Android and iOS. Topics include: bagging and tagging SSDDs, logical and physical acquisition of SSDDs, analysis of SSDDs, authentication of SSDD evidence, evidence reconstruction, the various operating systems on SSDDs, SSDD ontology, and application artifacts found on SSDDs.

  • This course provides students with the theoretical and practical foundations necessary for the investigation of volatile memory. The discipline of digital forensics will be discussed and outlined with emphasis on the sub-discipline of memory forensics. Students will learn the techniques of acquiring digital evidence from volatile memory and analyzing it. Topics covered include: the volatility framework, Windows memory forensics, Windows objects and pool allocations, processes, handles and tokens, process memory internals, hunting malware in process memory, event logs, registry in memory, networking, Windows services, kernel forensics and rootkits, Windows GUI subsystems, disk artifacts in memory, event reconstruction and timelining.

  • Introduction of the C++ programming language and further topics in both C and C++. Problem-solving methods, algorithm development, and good programming style. Pointers, strings, structures, two-dimensional arrays, files, recursion, dynamic memory allocation and management, parameter passing mechanisms, and the use of pointers to process arrays and lists. Basic algorithms for searching, sorting, and simple numerical analysis. Programming assignments will include both numeric and non-numeric applications. Students whose prior experience is not in C programming will be asked to attend a 1-period bridge section for several weeks.

  • Techniques and tools for developing simple scripts in Python. Python and several libraries are introduced by a comparative approach and their applications to varied tasks are explored.

  • The University of New Haven offers a wide variety of in-depth courses that create a transformational educational experience for our students. To view the complete list of courses you'll take while pursuing a Bachelor of Science in Cybersecurity, check out the Academic Catalog:


Learn about earning college credit through Project Lead the Way.

Â鶹´«Ã½ Advantage

Get an inside look at what differentiates the University of New Haven and how your experiences as a student will prepare you for success.

Nationally Recognized Center for Career Development

All University of New Haven students have access to the many resources available through the University’s Career Development Center, which has been named one of the best in the nation by The Princeton Review.

From career assessments, networking, and job shadowing to on-campus interviews and salary negotiation, the Career Development Center provides the skills and connections to identify a meaningful career and an opportunity to pursue your passion.

Learn More
Awards

ASEE Diversity Recognition Program - Bronze Level

For its diversity, equity and inclusion efforts the Tagliatela College of Engineering has been recognized at the Bronze Level by the American Society of Engineering Education's Diversity Recognition Program.

U.S. News & World Report  Best Colleges - Engineering Programs

The University’s Tagliatela College of Engineering is again rated in the top third in its category (institutions that do not offer a doctorate in engineering).

Learn More

Upcoming Events

There are a variety of opportunities for you to learn more about our programs, what it is like to be a student here, and the scholarships, assistantships and financial aid that we offer. Whether you want to meet us on campus or online, we have something for you.

Next Steps
  • Whether you're still in high school or are transferring from another college, we offer full- and part-time opportunities for undergraduates from inside the U.S. and abroad. The admission process can begin as early as the end of your high school junior year.

    The Application Process

  • We offer a comprehensive financial aid program, with students receiving assistance in the form of grants, scholarships, student loans, and part-time employment. Funds are available from federal and state governments, private sponsors, and from university resources. More than 85 percent of the University's full-time undergraduate students receive some form of financial assistance.

    Learn More