Cybersecurity Concepts

Learn About Our Programs

Step 1: Program
Step 2: Contact
By submitting this form, I agree that University of Arkansas Grantham may email, call and/or text me about education programs at the number provided including a wireless number, possibly utilizing automated dialing technology. Message and data rates may apply. Providing this consent is not required in order to enroll. If I live outside the U.S., I am giving consent to transfer my data to the U.S. I also agree to the terms in our privacy policy.

Advance Your Education

The Cybersecurity Concepts program introduces students to security threats and vulnerabilities and the principles, practices, policies and standards for securing information systems. Networks, as the heart of information systems, are addressed through standard models and protocols. Through hands-on simulations and virtual labs, students learn to configure and secure computer networks. Practice exams allow students to prepare for the CompTIA Network+ and Security+ certification exams. Upon completion of this program, graduates may enter entry-level positions in cybersecurity. Graduates may also continue their education and transfer courses within the certificate program to bachelor’s degree programs in information systems security.

Expect More from UA Grantham

More transferability: Students can transfer up to 6 applicable credit hours for this degree, which could reduce your time needed to complete this course.More affordability: UA Grantham has one of the lowest tuition rates in the U.S.1

More start dates: Most courses in this program start monthly. It's easy to get started whenever you're ready.

More credibility: UA Grantham is accredited by the Distance Education Accreditation Commission (DEAC), which is listed by the U.S. Department of Education as a recognized accrediting agency and recognized by the Council for Higher Education Accreditation (CHEA)

Program Outcomes

    • Identify the layers of the OSI model
    • Explain common networking protocols
    • Set up and troubleshoot various network topologies
    • Categorize threats and vulnerabilities to a network or information system
    • Explain and apply different strategies for securing networks or information systems
    • Determine the components and strategies for the implementation of an information systems security plan
    • Identify relevant laws and standards applicable to information systems security and computer crime

Need More Help?

Talk to a dedicated admissions representative and get answers to all your Cybersecurity Concepts questions. Give us a call at 800-955-2527 or email us at

Get in Touch