Protect Organizations from Cyber Threats

Prepare for a Career in Fighting Cybercrime

The threats of cybercrime, data breaches, and identity theft are challenges that have become all too common in modern society. Lead the charge to repel these threats when you earn your Bachelor of Science in Cyber and Data Security Technology from the University of Arizona Global Campus.

In this program, you’ll build your knowledge in cyber and data security technology, gain the opportunity to become a data security partner for businesses of all sizes, and learn how to harness technology to prevent 21st century crime with our online cyber and data security classes.

Your online cyber and data security technology degree was built on the principles of domestic and international information security. This online cybersecurity degree will teach you how to become a cybersecurity and data security professional who can support both government and industry to protect the information systems of the organization.

When you graduate from this program, you’ll be able to:

  • Analyze a complex computing problem and apply principles of computing and other relevant disciplines to identify solutions
  • Design, implement, and evaluate a computing-based solution to meet a given set of computing requirements in the context of the program’s discipline
  • Communicate effectively in a variety of professional contexts
  • Recognize professional responsibilities and make informed judgments in computing practice based on legal and ethical principles
  • Function effectively as a member or leader of a team engaged in activities appropriate to the program’s discipline
  • Apply security principles and practices to maintain operations in the presence of risks and threats

Why Choose the University of Arizona Global Campus?

Accelerated 5 week courses
1 course at a time
$0 Application Fee
Accredited by WSCUC

Military Students $250.00/credit

Undergraduate Courses $460.00/credit

Technology Fee** $115.00/course

Books and Other Class Materials** $125.00/average per course

Smiling Graduating Student
Scholarships

UAGC offers enrolled students access to ScholarshipUniverse, a platform that tailors external scholarship opportunities to your unique situation, making it easier to find and apply for scholarships.

Learn More

Partnership Savings

UAGC is proud to provide reduced tuition rates for our academic and corporate partners, helping community college transfer students and corporate employees earn their degrees at a lower cost.

Learn More

Course Overview

1

Freshman Year

  • In this foundational course, students explore the principles necessary for achieving personal and career success. GEN 101 serves as a road map, guiding students as they begin their academic journey. Through self-discovery, surveying available resources, connecting with UAGC groups, and engaging with Career Services, students learn the essential skills of planning and goal setting. Students apply their personal strengths, skills, and lifelong learning strategies to develop essential career competencies. By making these meaningful connections students gain a deeper understanding of how their education relates to their desired career path.  Congratulations on embarking on this college journey filled with growth, exploration, and endless possibilities! This course is not available for non-degree seeking students and is not available as an elective.

  • This course provides a comprehensive foundation in essential computer and digital literacy for the 21st century. Students will be introduced to emergent technologies such as artificial Intelligence, cloud computing, and evolving web models with immersive, real-world simulations. Through hands-on labs and practical applications, students will gain proficiency in industry-standard tools, operating systems, productivity software, and internet technologies. The course also offers optional certification preparations, enabling flexible pathways toward professional opportunities and advanced career development.

  • Learn and use key, practical skills that are applicable at home, at work, and in all UAGC courses! As UAGC students progress in their academic journey, strategies for personal, professional, and academic success continue to develop. This introductory course takes a two-pronged approach to setting students on a path to success. It merges fundamental informational literacy concepts with essential resources and skills that prepare students for college and career. Students learn how to identify, locate, evaluate, apply, and acknowledge information obtained through UAGC Library databases and internet search engines. By applying the research process, students sharpen critical thinking skills and learn to use information ethically. The final project is a practical and relevant opportunity for students to apply their learning in personally, professionally, and academically meaningful ways.

  • ENG 121 is designed to introduce students to the standards of writing in both academic and professional settings. The class will operate by first introducing, and then allowing students to practice, several written communication skills. Throughout, we will work to understand writing as a process, one that is strengthened through critical thinking, deepened by research, and built on a foundation of professional standards. Students will articulate a sense of their own skills and goals, and engage in collaborative conversations with peers and their instructor so as to be able to express their ideas more effectively. During the course, students will use the writing process to scrutinize their own perspectives while challenging them to embrace a wider conversation.

  • This course is designed to expand students’ appreciation of film and knowledge of how films are made. Through analysis of storytelling in a visual medium, students will examine the ways in which movies are shot, develop characters, evoke emotion, depict physical reality, reflect society, and have the power to influence it. Though the focus of the course is film itself, students will gain deeper intercultural fluency while growing their skills in critical thinking, written communication, and visual analysis.

  • This course is a study of correct and incorrect reasoning involved in everyday activities. The fundamentals of language and argument, deductive and inductive reasoning and other aspects of practical reasoning are examined. 

  • This course examines and evaluates theories and arguments concerning ethics and moral reasoning from a philosophical perspective. By engaging with historical and contemporary sources, students will analyze theories about the meaning, nature, and justification of ethical concepts; determine and assess how different forms of moral reasoning apply to contemporary moral issues; become more reflective and informed about their own moral beliefs; and develop their capacity for critical practical reasoning.

  • In this course, students will develop and expand their research and writing skills to communicate ideas in informed, ethical, and persuasive written documents intended for a range of audiences across a range of situations and contexts. Students will receive instruction and practice in synthesis and analysis, bolstering their written communication skills with a thorough understanding of academic research while honing critical thinking skills and effective work habits. Through writing well-structured, logical, and effective academic essays, students will explore tools and develop topics in a way that is meaningful to academic and professional lives. Prerequisite: Successful completion of ENG 121 or equivalent with a grade of “C-” or better.

  • This course is designed to aid students in understanding the dynamics of interpersonal relationships. Verbal and nonverbal communication patterns among people in personal, social, academic, and professional settings will be examined, within and between cultures, including both face-to-face and technologically mediated channels.  The nature of these interactions will be evaluated using contemporary communication theory. The course will enable students to identify their interpersonal communication skills and behaviors and to more critically evaluate their own oral communication and that of others. The primary goals of the course are to improve the quality of students’ communication in their personal and professional relationships, to enhance students’ experience and. confidence with oral communication, and increase awareness of the importance of interpersonal communication that is inclusive and equitable.

  • This course surveys American history from 1877 to the present. Emphasis is placed on the multifaceted experiences within American society; political, economic, intercultural, and social trends; and the impact of the United States in world affairs. Prerequisite: ENG 122 or successful completion of the Written Communication Competency II requirement.

2

Sophomore Year

  • This course introduces students to the interdisciplinary field of social sciences and some of the disciplines that comprise this field, including anthropology, psychology, economics, sociology, political science, and history. In this course, students will learn important social science concepts and theoretical approaches, along with the research methods that social scientists use to study human behavior. They will also learn how research and findings from the social sciences can be applied broadly throughout society. Throughout the course and through a summative assignment, students will examine how social factors shape social behavior and some of the consequences of current social problems.

  • In this course, learners deepen their understanding of the importance of natural resources to mankind. Students explore physical, biological, and ecological principles, examine how human alterations affect the environment, and reflect on the controversies surrounding various approaches to addressing environmental problems and the steps some communities have taken to address these challenges.

  • In this course, students will explore a wide range of Algebra topics. Topics will include study of linear equations, linear relationships, slope, polynomials, and functions, including graphing relations and solving systems of equations. Emphasis will be placed on developing an awareness of historical and current uses of algebra in real life settings, in various careers, and in solving important societal problems.

  • The capstone serves as an opportunity to reflect upon, integrate, and showcase learning achievement. Through discussions and course-embedded assessments, students will demonstrate a mastery of essential general education competencies as they relate to their personal and professional lives and provide evidence of growth through application of competency related skills to real-world situations. A minimum grade of “C-“ is required to meet course requirements. Prerequisite: 75 completed credits or permission of the student’s college or dean.

  • This course provides students with essential skills in identifying and mitigating cybersecurity threats, with a focus on the hardware aspects of desktops and enterprise networks. Through hands-on labs and real-world case studies, students will learn advanced threat-hunting techniques, hardware-based detection strategies, and the integration of hardware and software tools. Students will be exposed to cybersecurity analysis and threat hunting, as well as securing enterprise networks against sophisticated cyber-attacks.

  • This course will allow the student to master beginning and intermediate-level cybersecurity skills and knowledge. Specific topic coverage includes: IT security analysts, vulnerability analysts, threat intelligence analysts, or anyone who is trying to get a better understanding of the concepts involved in conducting cybersecurity analysis. Topics related to the course are applying environmental reconnaissance, analyzing network reconnaissance, strengthening the network, exploring penetration testing, scanning for vulnerabilities, analyzing vulnerability scans, reacting to a cyberincident, understanding the impact of forensics, analyzing common symptoms of a security breach, and in depth software development and data analytics.

  • This course provides a foundational understanding of the central questions and primary methodologies used in macroeconomics. Students will explore the behavior and performance of an economy, focusing on key topics such as gross domestic product (GDP), national income, inflation, unemployment, and economic growth. The course examines how aggregate demand and aggregate supply interact within the economy and the role of fiscal and monetary policy in stabilizing economic fluctuations. Through the analysis of economic models and real-world data, students will gain insights into the determinants of economic output, the impacts of government policies, and the global economic environment. By the end of the course, students will be equipped with the analytical tools necessary to understand and evaluate economic issues, policies, and trends on a macroeconomic scale. Recommended prerequisites: Fulfillment of the General Education Critical Thinking core competency and Digital Literacy competency.

  • The purpose of this course is to give students of all backgrounds and experience levels a well-researched and engaging introduction to the realm of network security and penetration testing. With real-world examples that reflect today's most important and relevant security topics, this course addresses how and why people attack computers and networks, so that students can be armed with the knowledge and techniques to successfully combat hackers. Because the world of information security changes so quickly and is often the subject of much hype, this course also aims to provide a clear differentiation between hacking myths and hacking facts. Many hands-on exercises are included, which allow students to practice skills as they are learned.

  • This course introduces students to the use of scripting and automation tools in cybersecurity and system administration, focusing on Python and PowerShell. Students will learn to automate tasks like system monitoring, log analysis, and threat detection, enhancing security and IT management efficiency. Through hands-on assignments, students will gain practical skills in scripting for cybersecurity operations and system administration.

  • This course will allow the student to understand the measures that can be taken to detect and diminish the probability of cyberattacks and natural disasters. Database security is defined and our enemies are identified. There is no such thing as guaranteed security, but armed with the knowledge provided in this course, major risks can be minimized. Students will learn basic and intermediate database security as well as information security, Identify the three main security objectives when protecting information systems, define database security threats and identify the characteristics of viruses and how they infiltrate systems, and commons strategies for exploiting database infrastructures, and exploit weaknesses. Students will also gain an understanding of auditing fundamentals.

3

Junior Year

  • This course introduces fundamental concepts in statistics and discrete mathematics. Students will learn to analyze statistical data, work with continuous random variables, and interpret graphical representations such as histograms and bar charts. Additionally, the course provides a solid foundation in discrete mathematics, focusing on developing the ability to clearly explain key mathematical ideas.

  • This course provides an in-depth understanding of how to effectively protect computer networks. Students will learn the tools and penetration testing methodologies used by ethical hackers. In addition, the course provides a thorough discussion of what and who an ethical hacker is and how important they are in protecting corporate and government data from cyber-attacks. Students will learn updated computer security resources that describe new vulnerabilities and innovative methods to protect networks. Also covered is a thorough update of federal and state computer crime laws, as well as changes in penalties for illegal computer hacking.

  • This course equips students with practical skills to identify and mitigate cybersecurity threats, emphasizing hardware aspects within enterprise networks. Through lectures and hands-on labs, students will learn advanced threat-hunting techniques, including hardware-based malware detection and firmware analysis. By the end of the course, students will have a robust understanding of hardware and physical security in networks and be well-prepared for various roles in cybersecurity.

  • In this course, students will learn how to manage the technology that affects organizations. Concepts covered include security best practices, access control, network components and services, change management, and configuration management. Students will gain an understanding of how the services offered by the various network components should be managed and protected. Prerequisite: INT 301.

  • This course introduces students to the principles of information systems security (confidentiality, integrity, and availability) and the seven domains of the typical IT infrastructure. Risks, threats, and vulnerabilities will be defined. Creation of an IT security policy framework will be emphasized. The following topics will be introduced: the risk management process, cryptography, compliance laws, and information security standards. At the end of the course, students will be able to apply the security life cycle to an information system.

  • This course introduces the risks associated with connecting to the Internet via web applications and social networking. Students will learn the Open Web Application Security Project (OWASP) Top 10 threats to web applications and the threat classifications of the Web Application Security Consortium (WASC). Instruction on how to maintain PCI-DSS compliance in e-commerce sites will be provided. At the end of the course, students will be able to secure web applications and mitigate vulnerabilities with web applications on the Linux and Windows platforms.

  • This course provides students with advanced tools such as Kali-Linux and other advanced penetration testing methodologies, tools used by ethical hackers. In addition, the course provides a thorough discussion embedded operating systems, hidden threats, hacking into web servers, cryptography and network protection systems. Students gain an advanced knowledge of hacking concepts, including the term ethical hacker, as well as penetration and security tests and the differences between them. Students will learn the differences between the terms hacker, cracker, and script kiddies. Next, they will learn about the white box, black box, and gray box models for conducting penetration testing.

  • This course provides advanced information assurance knowledge for students who want to become IT Professionals. Students will gain knowledge of security and risk management, asset security, security architecture and engineering, communication and network security, identity and access management, security assessment and testing, security operations, and software development security. Students will understand and apply concepts of confidentiality, integrity, and availability. Determine compliance requirements and learn to establish and maintain security awareness. Students will also learn to establish controls based upon systems security requirements.

  • This course equips students with the skills to produce clear, concise, and well-structured scientific and technical documents tailored to diverse audiences. Through research-driven writing, students will learn to convey complex information effectively, focusing on conciseness, precision, organization, and audience awareness. Emphasis is placed on developing technical reports, proposals, and other professional documents. Prerequisites: ENG 122 or fulfillment of General Education Written Communication Competency II requirement and fulfillment of General Education Scientific Reasoning requirement.

  • This course expands upon the cryptography concepts learned in CYB 301 Introduction to Cyber & Data Security Technology. A history of cryptography will be presented. Topics include symmetric encryption algorithms, asymmetric encryption algorithms, and hashing functions. The protocols, tools, and techniques used in cryptography will be reviewed. Hacking techniques that use cryptography will be introduced. At the end of the course, students will be able to design a cryptography plan to safeguard information that is electronically transmitted.

4

Senior Year

  • This course builds upon the risk management concepts learned in CYB 301 Introduction to Cyber & Data Security Technology. Topics presented are risk management standards, methods, and tools and IT governance and control frameworks. Methods to prepare a risk analysis will be reviewed. Upon completion of the course, students will be able to identify an organization’s threats and vulnerabilities, and the associated risks along with the probability that the risks will occur.

  • This course builds upon the compliance concepts learned in CYB 301 Introduction to Cyber & Data Security Technology. Students will examine laws and/or regulations that may apply to an organization. The various types of evidence and how to protect the evidence via the chain of custody will be emphasized. Upon completion of the course, the students will be able to perform a digital forensic investigation.

  • In the Cyber & Data Security Technology Capstone course, students will complete an original and significant project that integrates concepts, principles, and tools taught throughout the program. In this course, the student will design, implement, test, and document a secured solution of the seven domains of an organization’s IT infrastructure. A presentation will be made by the individual for evaluation and approval. Prerequisites: GEN 499. This course must be taken last in the program.

Program Requirements
Credit Breakdowns
General Education
43
Credits
Major Credit Requirements
57
Credits
Electives
20
Credits
Total Credits
120
Credits

To earn your Bachelor of Science in Cyber & Data Security Technology at the University of Arizona Global Campus, you must complete 120 credits. You will need to complete 30 upper-division credits, of which 18 credits must be from the major program. A total of 30 credits must be completed at Global Campus to meet the residency requirement. You may be able to transfer approved credits from community colleges, other previous college coursework, or other life experiences such as military service or job training toward your degree.

Program Specific Requirements:

  • Platforms: The most currently commercially available version of the Windows operating system (as of August 2024 this is Windows 10 or higher) or macOS (as of August 2024 this is macOS 14.5). Note: The most current version of the Windows operating system is the recommended platform.
  • Administrative Rights: Students must obtain administrative rights to their computer and Internet connection. The ability to download and upload files from various sources and providers will be required. Students must have administrative rights to their computers to facilitate the following:
    1. Software Installation: Many TEC courses require the installation of specialized software, including development environments, programming languages, and database management systems.
    2. File Management: The ability to manage files such as downloading, uploading, and modifying files from various sources.
Program Mission Statement

Our mission is to equip students with advanced knowledge and practical skills in cyber defense to protect digital assets and information in a rapidly evolving technological landscape. We are committed to creating a rigorous academic environment that emphasizes critical thinking, ethical practices, and hands-on experience. Our program prepares graduates to become innovative leaders and effective problem-solvers in cybersecurity, strengthening the security and resilience of digital infrastructures worldwide.

Program Educational Objectives

The Bachelor of Science in Cyber and Data Security Technology program at the University of Arizona Global Campus expects graduates within a few years of graduation to attain the following:

  • Address the challenges of the rapidly changing cyber security technology, ethically and responsibly.
  • Exceed the increasing expectations of employers in solving complex problems in cyber security.
  • Attain industry required skills for technical, supervisory and management positions.
  • Gain leadership positions in the cyber security industry, academe, and government.
Student Outcomes

Graduates of the program will have an ability to:

  • Analyze a complex computing problem and apply principles of computing and other relevant disciplines to identify solutions.
  • Design, implement, and evaluate a computing-based solution to meet a given set of computing requirements in the context of the program’s discipline.
  • Communicate effectively in a variety of professional contexts.
  • Recognize professional responsibilities and make informed judgments in computing practice based on legal and ethical principles.
  • Function effectively as a member or leader of a team engaged in activities appropriate to the program’s discipline.
  • Apply security principles and practices to maintain operations in the presence of risks and threats.
Student Enrollment and Graduation Data

UAGC OIE can provide the IPEDS Enrollment and Graduation Data.

Licensure and Certification Terms and Conditions

This program is not designed to meet the state educational requirements for a specific professional license or certification in any state. Students seeking licensure or certification in a particular profession shall carefully research the requirements prior to enrollment and regularly review the requirements as they are subject to change. Requirements vary by state. The University of Arizona Global Campus does not guarantee that any professional organization will accept a graduate’s application to sit for any exam for the purpose of professional certification. Further, a criminal record may prevent an applicant from obtaining licensure, certification, or employment in their field of study.

Certain degree programs may not be available in all states.

Quality Matters Certification

The Online Teaching Support Certification recognizes programs that require all online faculty to undergo training in best practices for online course delivery, provide faculty with ongoing pedagogical support, encourage faculty professional development to increase their knowledge and skill in online teaching, emphasize instructor availability and feedback to learners, and collect and use feedback from learners to improve online teaching. Learn More

The Online Learner Support Certification recognizes programs that provide all the critical student and academic services needed for learner success and use learner feedback to continuously improve those services.

What Can I Do with a Degree in Cyber and Data Security Technology?

Career Paths

As a graduate of this program, there are many types of cybersecurity jobs you could pursue, including:

  • Information Security Specialist
  • Information Systems Security Analyst
  • Information Technology Security Analyst (IT Security Analyst)
  • Security Analyst
  • Systems Analyst
  • Information Technology Specialist (IT Specialist)
  • Forensics Analyst
  • Information Security Officer
  • Penetration Tester
  • Information Security Analyst
  • Security Manager Specialist
  • Security Manager
Connect With Career Services
Career Fields

As reports of cyberattacks on businesses have become more frequent in recent years, the need for data security professionals has grown. Your Bachelor of Science in Cyber and Data Security Technology degree will provide you with the knowledge to help organizations in many industries protect their data.

Connect With Career Services
Job Market Outlook

Gain insights into the cybersecurity and data security job market by reviewing the Bureau of Labor Statistics market outlook report.

View Full Market Outlook

The ability to work towards my degree and maintain my daily life was a huge factor in my decision to go back.

Gigi R.
UAGC logo
Class of 2023

BS in Cyber and Data Security Technology FAQs

  • A Cyber and Data Security Technology degree prepares graduates for a wide range of in-demand cybersecurity roles. Graduates can pursue work as analysts, IT specialists, and more. The degree provides the necessary skills to protect networks, systems, and data from cyber threats, making it a valuable asset in today's digital age.

  • At UAGC, your core coursework in the cyber and data security technology bachelor’s degree focuses on fundamental knowledge of the technology associated with computing, software, and information technology, as well as relevant business topics such as project management and technical writing. Your major course requirements will develop your cyber and data security skills to protect systems, web apps, social networking sites, and more.

  • Certifications may enhance your job prospects. While not always strictly required, certifications validate your skills and knowledge, making you more attractive to employers. Common certifications include CompTIA Security+, CISSP, and CEH.

  • The increasing quality and accessibility of online education have significantly reduced the stigma associated with online degrees. According to U.S. News & World Report, many employers now recognize the value of online programs, especially from accredited universities like UAGC.

  • While in most online programs, you would need basic computer skills, reliable internet access, and a compatible device (laptop or desktop computer) to be successful in your program, because of the technical aspect of the UAGC cyber and data security technology program, you will also need the most currently commercially available version of the Windows operating system or macOS, as well as administrative rights to your computer and internet connection. Additional details regarding technology requirements can be found in the UAGC Academic Catalog.

*

To access this rate using the Liberty Grant, only eligible undergraduate active duty service members, members of the National Guard, Reservists, spouses of active duty, members of the National Guard and Reservists, Department of Defense employees using Tuition Assistance (TA), and civilian employees of the United States Coast Guard (only if utilizing Military Tuition Assistance) will qualify.

**

The Technology Fee covers access to University systems such as the online classroom, the Student Portal, and other academic resources. The Technology Fee and the Course Digital Materials (CDM) Fee are fully refundable if a student does not attend beyond Day 3 of a course (Week 3 if covered under the University of Arizona Global Campus Promise Refund Schedule). After this time, the fee becomes non-refundable. Students are charged the Technology Fee for repeated coursework. Students are not charged the CDM fee for repeated coursework if previously charged.

The transferability of credits is subject to the University of Arizona Global Campus transfer credit policies and requires the submission of official transcripts. The official transcripts will be evaluated by the Registrar’s Office to determine the credits that will officially apply toward a UAGC degree program. Credits must be earned at the same degree level in order to be applied. Additional restrictions may apply. See the UAGC Academic Catalog for full undergraduate and graduate transfer policies.

Search UAGC

Let us help.

Fill out this form to talk with an advisor.

Are you currently a licensed RN?

This program requires you to be a current licensed registered nurse. Please check out other programs to reach your education goals such as the BA in Health and Wellness.

Are you a member of the military?

We are currently not accepting new enrollments in the state of North Carolina.