Bachelor of Applied Science
The Bachelor of Applied Science in Cyber Operations gives students extensive hands-on experience and develops the knowledge, skills and abilities necessary to succeed in defense, law enforcement and private industry.
The Cyber Operations program prepares graduates for cyber-related fields using offensive and defensive cybersecurity content delivered within our state-of-the-art Cyber Virtual Learning Environment. It is a highly technical, interdisciplinary program that offers two degree tracks:
The Engineering Track is firmly grounded in the computer science, networking and cybersecurity disciplines. This track conforms to the National Security Agency (NSA) Center of Academic Excellence in Cyber Operations (CAE-CO) academic requirements for low level programming; software reverse engineering; operating system theory; secure software development and security analysis; mathematics and algorithms; networking; cellular and mobile technologies; cloud computing; offensive and defensive cyber operations; and cyber law, ethics and policy.
The Defense and Forensics Track encompasses the areas of offensive and defensive cyber operations, cyber threat intelligence, malware analysis, networking and digital forensics. This track conforms to the academic requirements for the NSA Centers of Academic Excellence in Cyber Operations (CAE-CO) and Cyber Defense (CAE-CD) for fundamental security principles, vulnerabilities and networking; digital forensics; offensive and defensive cyber operations; introduction to cryptography; probability and statistics; and cyber law, ethics and policy.
This degree is designed for students transferring approximately 60 credits from a regionally accredited institution. During the application process, the submission of a resume and goal statement is required for professional admission to the program. Before applying, we recommend that you discuss your background with a program adviser. Contact email@example.com or 520-621-0898 for a referral.
Courses combine hands-on cyber activities in a virtual learning environment with a strong academic educational experience. Required courses include:
- CYBV 400: Active Cyber Defense - Introduction to the policies, techniques, and operational capabilities and limitations involved in implementing defensible network architectures.
- CYBV 454: Malware Threats & Analysis - Acquisition of the methodologies used to safely perform static and dynamic analysis of software of potentially unknown origin, including obfuscated malwares, to fully understand the software's functionality and specifications.
- CYBV 484: Cyber Warfare - A broad survey of cyber warfare tools, techniques and procedures, as well as cyber warfare policy, doctrines, and constraints.