UTSA is the place to be for hands-on and relevant cyber security and information systems education.
As one of the first schools in the nation to be certified by the National Security Agency as a Center of Academic Excellence, this means our curriculum meets real-world needs and is viewed as high quality by a leading federal security agency.
The College of Business has been offering cyber security classes since 2001. Our programs are led by world-class researchers and academics, as well as adjuncts who work in security and understand the needs of industry.
The Cyber Center for Security and Analytics at the UTSA College of Business conducts research on a wide variety of cyber security and cyber analytics topics such as how to better secure people, organizations and their data, using advanced analytics for cyber-related decision making and solving real-world problems with industry and government partners. The center plays an important role in pioneering innovative and world-class educational programs in the rapidly evolving field of cyber security.
To support individuals looking to start, transition, or enhance careers in intelligence or national security, the Intelligence Community Center for Academic Excellence (IC CAE) can provide the necessary skills and training through academic coursework, research and professional development. This program is sponsored by the Defense Intelligence Agency and Office of the Director of National Intelligence. Scholarships are available to support the next generation of technical intelligence professionals.
Our Cyber Range is a controlled virtual training environment to prepare your team for potential cyber-attacks. In partnership with Cyber Range Solutions Inc. (CRS), our range features Cyberbit, which is the most widely deployed cyber security training and simulation platform. Training in the Cyber Range will prepare your security team for an attack, and provide a hyper-realistic virtual SOC environment where your security or leadership team can train to respond to real-world, simulated cyber-attacks.