Cyber Security

Learn About Our Programs

Step 1: Program
Step 2: Contact
By submitting this form, I agree that University of Arkansas Grantham may email, call and/or text me about education programs at the number provided including a wireless number, possibly utilizing automated dialing technology. Message and data rates may apply. Providing this consent is not required in order to enroll. If I live outside the U.S., I am giving consent to transfer my data to the U.S. I also agree to the terms in our privacy policy.

Advance Your Education

The online Bachelor’s in Cyber Security can be the ideal choice for you if you have skills in information technology and the desire to keep people safe from online attackers. Once you’ve enrolled in this degree program, you can explore concepts relating to general IT, such as programming, design and data storage. Each of these areas can prepare you for more in-depth learning later in the program that is geared toward identifying threats on computers and other technological devices. Later courses in this program can introduce you to varying threats in the online environment – such as viruses and hackers – and help you develop skills to safeguard networks and devices from them.

Expect More from UA Grantham

More transferability: Students can transfer in up to 75% of credits for this degree.

More affordability: UA Grantham has one of the lowest tuition rates in the U.S.1 and we provide a new laptop to all new and returning degree-seeking students—at no additional cost.

More start dates: Most courses in this program start monthly. It's easy to get started whenever you're ready.

More credibility: UA Grantham is accredited by the Distance Education Accreditation Commission (DEAC), which is listed by the U.S. Department of Education as a recognized accrediting agency and recognized by the Council for Higher Education Accreditation (CHEA).


Program Outcomes

  • Apply knowledge of computing and mathematics appropriate to the discipline
  • Analyze a system, and identify and define the security risks and requirements for secure operation
  • Design, implement and evaluate a computer-based system, process, component or program to meet security needs
  • Address professional, ethical, legal, security and social issues and responsibilities
  • Communicate effectively with a range of audiences
  • Analyze the local and global impact of computing on individuals, organizations and society
  • Recognize the need for and an ability to engage in continuing professional development
  • Use current techniques, skills and tools necessary for computing security practice
  • Identify and analyze security risks of an information system
  • Develop security and recovery policies appropriate to an information system

Need More Help?

Talk to a dedicated admissions representative and get answers to all your Cyber Security questions. Give us a call at 800-955-2527 or email us at admissions@uagrantham.edu.