A cybersecurity degree or certificate will prepare students for one of the fastest-growing fields. Cybersecurity is critical as we become more and more dependent on our data.
The Bachelor of Science in Cybersecurity, our exciting stackable certificates, and our cybersecurity graduate certificate provide students with the education and opportunities needed to thrive in this challenging discipline. The Bureau of Labor Statistics estimates that employment of information security analysts is projected to grow 35% over the next decade. This is much faster than the average for all occupations. We are well-equipped to prepare you for one of the fastest-growing fields in the world!
Our faculty have rich industry experience and a passion to help you build your skills and interest in cybersecurity defense operations. Our curriculum meets the constantly changing threat landscape in cybersecurity. Students may also utilize the Trojan Cyber Arena in the EAC. The Trojan Cyber Arena has a safe and highly accessible cloud environment that deploys workouts for students to build their skills in cybersecurity applications.
View the degree plan.
Cybersecurity Degrees and Curriculum
- Bachelor of Science in Cybersecurity
- Cybersecurity Fundamentals Certificate of Proficiency
- Advanced Cybersecurity Technical Certificate
Undergraduate Cybersecurity Certificates
UA Little Rock offers two undergraduate certificates in cybersecurity:
Cybersecurity Fundamentals Certificate of Proficiency
This certificate provides students with opportunities for an entry-level career in cybersecurity or to augment their education with a better understanding of the cybersecurity discipline.
Advanced Cybersecurity Technical Certificate
This certificate provides the fundamental courses necessary to begin work as a cybersecurity professional. Students may consider taking this as an alternative to the traditional bachelor’s degree or as credit towards their bachelor’s degree. The certificate stacks up on top of the Cybersecurity Certificate of Proficiency.
Graduate Cybersecurity Certificate
The graduate certificate in cybersecurity consists of 15 graduate credits. This certificate serves i) working professionals seeking to advance their career in cybersecurity, ii) graduate students seeking to conduct cybersecurity research, and iii) high school teachers who will teach concurrent credit high school courses in cybersecurity.
Students enrolled in any of the three graduate programs for Computer Science, Information Science, or Information Quality may complete this certificate as part of their elective coursework.
This program complements the National Cyber Teaching Academy (NCTA). High school teachers can take CSEC 7301: Teaching Cybersecurity to complete the 18 graduate hours required by most states for teaching concurrent credit courses
Cybersecurity Careers
This information is from the U.S. Bureau of Labor Statistics:
- Information security analysts plan and carry out security measures to protect an organization’s computer networks and systems.
- Most information security analysts work for computer companies, consulting firms, or business and financial companies.
- Information security analysts typically need a bachelor’s degree in a computer science field, along with related work experience. Employers may prefer to hire analysts who have professional certification.
- The median annual wage for information security analysts was $120,360 in 2023.
- Cybersecurity Career Options
- Cybersecurity Job Guide
- Women in Cybersecurity
- Semester-by-Semester Schedule
Mission, Objectives, and Outcomes
Prepare a diverse student body for successful careers in cybersecurity by providing them with a comprehensive education emphasizing technical skills, critical thinking, innovation, communication, and ethics. Our goal is to produce graduates who are well-equipped to address the complex and constantly-evolving challenges of cybersecurity and who are committed to positively impacting the world.
Within five years after graduating, the University of Arkansas Little Rock cybersecurity graduates will have the skills, knowledge, and choices to become:
- Highly qualified leaders in industry or government who creatively apply theoretical and practical knowledge of cybersecurity to secure systems from threats across diverse organizational and operational contexts.
- Life-long learners who seek certifications, graduate studies, and leadership opportunities and who advocate awareness of cyber threats, promote secure practices, and influence policy to strengthen the resilience of digital infrastructure.
- Ethical professionals who uphold legal, regulatory, and professional standards, respect privacy, and safeguard critical systems while fostering trust and accountability in their work.
In alignment with ABET Criteria for Cybersecurity Programs, graduates of the program will have the ability to:
- Analyze a complex computing problem and to apply principles of computing and other relevant disciplines to identify solutions.
- Design, implement, and evaluate a computing-based solution to meet a given set of computing requirements in the context of the program’s discipline.
- Communicate effectively in a variety of professional contexts.
- Recognize professional responsibilities and make informed judgments in computing practice based on legal and ethical principles.
- Function effectively as a member or leader of a team engaged in activities appropriate to the program’s discipline.
- Apply security principles and practices to maintain operations in the presence of risks and threats.
To retain our National Center of Academic Excellence in Cyber Defense designation, we extend Student Outcome #6 (Security Principles) by specifying the following cybersecurity-specific outcomes:
- Assess: Assess cybersecurity risk in terms of organizational mission
- Protect: Identify system-level cybersecurity protection
- Respond: Conduct response, recovery, and investigation to a cybersecurity incident
- Situational Awareness: Maintain situational awareness in cybersecurity operations
- Privacy: Implement privacy protections in data processing
- Digital Forensics, Legal, and Ethics: Present ethical and legal implications in cybersecurity situations