Cyber security plays an integral role in defending and protecting a business’s most valuable assets from digital threats. In this program, you’ll learn how to build defensive infrastructure, fight off external dangers, and contribute to long-term business success.
Earn Your Bachelor of Business Administration in Cyber Security at UTSA
Earn a Best-in-Class Degree from a Nationally Ranked Program
UTSA’s unique program contextualizes the role of cyber security within the greater business landscape. By building a general knowledge of business alongside highly marketable cyber security skills, you’ll be better able to protect and defend valuable information, data, and assets. Plus, with a comprehension of the dynamic relationship between cyber security and an organization’s greater goals, you’ll also be prepared for active involvement in building and sustaining the future. Obtain your online cyber security degree from an accredited organization at the University of Texas at San Antonio.
AACSB-accredited schools are considered to be among the best business schools in the world. With AACSB accreditation, UTSA’s Carlos Alvarez College of Business has passed rigorous standards for program quality.
100% Online, Designed to fit into your Lifestyle
Because we offer the coursework 100% online, you can personalize your experience to fit your schedule. Also, you may receive credit for your previous college credit, shortening time to completion so you can begin or advance your career in cyber security sooner. The good news is your academic advisor will help you develop your plan through to graduation.
Learn from the Best
You’ll learn from our top-tier faculty with academic expertise in digital forensics, secure design, and detection, giving you the industry-aligned skills, you need to advance your career. The quality of our academics was recognized by Intelligent.com, which ranked UTSA #1 for academic support and #15 overall among the top online cyber security degrees in 2020.
National Endorsements and Awards
What Makes UTSA’s Cyber Security Program Unique?
UTSA has been designated as a Center for Academic Excellence (CAE) by the National Security Agency and the Department of Homeland Security in the areas of CAE-Education, CAE-Operations and CAE-Research and is one of only 10 institutions in the nation to achieve all three designations.
Careers with a Cyber Degree
Cyber Security is an exciting, growing field in a state of constant innovation. Our curriculum is designed to get you to the top of your game and make you a sought-after cyber security professional.
Graduates of our program are fully trained for in-demand occupations including:
- Cyber Security Analyst
- Information Security Analyst
- Network Security Analysts
- Software Developer, Systems Software
- Software Developer, Applications
- Vulnerability Assessment Analysts
Largest employers of UTSA graduates include:





Situs SBOBET Casino Online Agen Judi SBOBET88 Resmi
Cybersecurity for Gambling and Online Entertainment
If you’re a fan of online gaming, you’ll know the importance of Cybersecurity for Gambling and Online Entertainment. Hackers can compromise a casino’s reputation or damage its brand. The most recent high-profile hacks have led to the suspension or revocation of licenses for these sites. Luckily, the security of these sites has improved over the past few years. Listed below are some of the best practices for protecting your account.
The first step to ensuring your gambling and online entertainment site’s security is to keep out malware. Trojans, worms, and other viruses cause the computer to crash or display malicious messages. These infections can also steal resources from your gaming account and sell them in the dark web. Another type of attack is known as “scraping,” which involves automated attacks on gambling sites that harvest data from websites and databases. These attacks can result in a significant increase in latency. While many people aren’t willing to risk losing their personal information, ransomware is a more severe threat that entails a hacker paying for the right to access their information. In addition, there are also scams called “scareware” that attempt to deceive the player into purchasing products that don’t exist.
Judi Online
The online gambling industry has seen a dramatic growth in recent years. Experts estimate that the market will be worth $92 billion by 2023. Due to the high stakes involved, Internet casinos have become a target for cybercriminals. Because of this, online casino establishments have implemented measures to counter attacks. The goal of this strategy is to keep users safe while enabling them to win the game. This is crucial for a safe and profitable environment for all parties.
Aside from ensuring customer privacy and security, online casinos must also ensure that their websites are protected from DDoS attacks and hackers. This is a constant uphill battle that has to be fought to protect the integrity of their sites. The online casino industry has made significant investments in cybersecurity. However, the threats are still present, so it’s important to implement robust security measures. Fortunately, many online casinos have implemented disaster recovery plans.
Apart from a secure online casino, players should also be cautious with their payment information. Since these details are vulnerable, hackers can easily take advantage of them and use them to make money. It’s essential for online casino operators to implement strong cybersecurity protocols to protect their customers. In addition to the encryption of the casino’s servers, online casinos should also use a secure internet connection. It’s essential to invest in cyber security for Gambling and the protection of their users’ personal information.
With the increased popularity of online gaming, cybersecurity for Gambling and Online Entertainment has become a top priority for online casino owners. Thousands of users visit these sites every day, and hackers are targeting them constantly, so it’s essential to implement a comprehensive security plan. A successful cybersecurity strategy will protect your data and keep players safe. If it’s well-maintained, it will keep your customers happy and protected.
Industries for Cyber Security Graduates
Cyber Security is a widely applicable major as businesses and organizations across several industries require staff and services related to this major. The industries that posted the largest number of Cyber Security-related positions over 2018-19 included:
- Telecommunications
- Aerospace Manufacturing
- Computer Systems Design
- Computer and Peripheral Equipment Manufacturing
- Management and Technical Consulting
Salaries for Cyber Security Graduates
The salary range for open cyber security-related positions in the US between November 2018 and October 2019 were:
Lowest 10% | $67,793 |
Median | $93,681 |
Top 10% | $120,153 |
Source: Burning Glass
Cyber Security Classes
Courses in this degree plan include:
To complete the Cyber Security program, you’ll complete 120 credit hours, including 42 core hours, 45-51 business common body of knowledge hours, and 33 major hours. More details.
Minor in Digital Forensics
The Minor in Digital Forensics is open to all majors in the University. Students majoring in Cyber Security wanting to declare a Minor in Digital Forensics will be required to take 18 semester credit hours of coursework. Other majors may be required to take additional hours depending on their academic background.
To declare a Minor in Digital Forensics, seek approval of course substitutions or course requirements by contacting your academic advisor.
Additional Cyber Security Requirements
Direct Admission Requirements
Beginning Fall 2022, all degree seeking students who meet UTSA regular undergraduate admission requirements and are able to enroll in MAT 1053 (TCCN: MATH 1324) or a higher-level mathematics course in their first semester at UTSA have direct admission to the B.B.A (all majors).
Technology Requirements
In order to participate in the program, Cyber Security students will need:
- Desktop or Laptop
- Operating System: Win10 Pro or Education Edition*
- Processor: Intel® Core™ i7
- RAM: 16GB
- Webcam (internal or external), speaker and microphone
- WiFi capability
- Additional Requirement: reliable broadband internet connection
*Registered students will receive one free license for Windows 10 Education Edition. More information will be provided after registration. For more information on specs, visit the Cyber Security department’s website.
Frequently Asked Questions
HOW MUCH DOES THE PROGRAM COST?
Tuition for the B.B.A. in Cyber Security is set at $450 per unit. Each class consists of three units.
Tuition is the same for residents and non-residents and does not include material and lab fees.
WHAT FINANCIAL AID AND RESOURCES ARE AVAILABLE?
You may qualify for financial aid, including grants, loans, and scholarships. For eligibility, you must complete the Free Application for Federal Student Aid (FAFSA) for the applicable aid year. UTSA’s federal school code is 010115. You must complete a new application each year you are attending.
As a Military Friendly School, we offer many programs to support our students in the military, our veterans, and their families, while working closely with the UTSA Veterans Certification Office. Veterans and military families, please note that UTSA’s Online B.B.A. in Cyber Security is not eligible for the Hazlewood Act benefit.
WHAT CAREERS CAN I PURSUE WITH A B.B.A. IN CYBER SECURITY?
With a B.B.A. in Cyber Security, you can expect to pursue a career at private businesses, non-profits, and government in the technology, financial services, consulting, manufacturing, energy, and transportation fields, among others.
Join our alumni working as Cyber Security Analysts, Network Security Analysts, Cyber Security/Information Security Specialists, Chief Risk Officer, Cyber Security Consultants, and Vulnerability Assessment Analysts at well-known organizations including:
- Accenture
- Air Force Office of Special Investigations
- Digital Defense
- FireEye
- Ford Motor Company
- National Security Agency
- Rackspace
- Raytheon
- USAA
WHAT KIND OF JOB PLACEMENT AND EMPLOYMENT SUPPORT WILL BE AVAILABLE TO ME?
You’ll have lifelong access to the UTSA Career Center, a robust source of information, resources, and services designed to help UTSA students and alumni achieve their career goals. These include:
- Career exploration through assessments and personalized coaching
- Resume and cover letter preparation
- Application and interview techniques
- Work-study and internship opportunities
- Access to an active alumni network
- Resources designed to connect you with employers, including job fairs, seminars, and an online recruiting portal for employers and students
You’ll also have access to the Center for Student Professional Development, which offers additional help in preparing for and securing internship and employment opportunities by connecting you with the business community and alumni through networking, mentoring, internships, externships, international opportunities, and resources that complement your academic education.
WHAT TYPES OF COURSEWORK ARE COVERED IN THIS DEGREE?
The B.B.A. in Cyber Security curriculum prepares you with the critical thinking, analytical, and technical skills to properly defend businesses from cyber-crime, while also establishing the relationship between cyber security and overarching business goals.
Cyber security major coursework continues to evolve as threats to cyber security become increasingly complex.
Topics of study include:
- Scripting and Programming (Bash, Python, Java)
- Telecommunications
- Intrusion Detection and Incident Response
- Operating Systems and Network Security
- Digital Forensic Analysis
- Malware Analysis
- Project Management
- Cyber Law and Legal System
HOW LONG WILL IT TAKE TO COMPLETE THE DEGREE?
If you’re a full-time student, you can expect to complete the UTSA online B.B.A. in Cyber Security degree in as few as eight terms. If you’re a part-time student, you can expect to complete your degree in 13 terms.*
*Actual time-to-completion will vary based upon credits previously earned and eligible for transfer.
WHAT ARE THE ADMISSIONS REQUIREMENTS FOR THIS PROGRAM?
See if you qualify for our B.B.A. in Cyber Security program and learn more about the application process on our Admissions Requirements page.
Want to Get Started?
Want to Know More?
Ready to Apply?
Connect
Follow us on our @UTSAonline channels