BECOME A
CYBER OPerations
PROFESSIONAL

UA delivers highly technical Cyber content through its world class Virtual Learning Environment to ensure our students gain the hands-on knowledge, skills, and abilities necessary to excel in the Cyber field.

The Cyber Operations Bachelor of Applied Science (BAS) degree is an advanced upper division Junior/Senior level program.

Students begin classes in the program once they have completed their preparatory Freshman/Sophomore lower division coursework. Lower division pathways exist for Arizona Online, numerous community colleges, as well as other academic and military institutions. We will help you define the courses you need whether you are a Freshman/Sophomore or ready to start your Cyber Ops BAS degree. Find out what sets our program apart.

Students at Computer

Curriculum Delivery

UA offers the Cyber Operations BAS degree in Face-to-Face, Hybrid, and Fully Online formats. We have carefully crafted our courses to ensure that students receive the exact same learning experience regardless of which learning modality they choose. Every Cyber Operations course provides live-synchronous lectures and hands-on exercise, utilizing relevant and up to date course materials. All online lectures are recorded and made available for students whose schedules do not allow them to attend the synchronous class meetings. Moreover, our UA Cyber Operations faculty are available to support student learning through both scheduled office hours and online live support.

Hands at Computer

Hands-On Learning

UA Cyber Operations courses are structured to maximize the ability to learn by doing. Cyber is a highly technical field that requires hands-on experience to master the material. UA Cyber courses maximize the opportunity for students to gain the hands-on experience they will need to be successful cyber professionals. Students not only have to learn the concepts and technologies, they must demonstrate they have mastered the course content through hands-on exercises and interactive assessments.

Cloud Network

Cloud Computing

There is no need for high performance, expensive computer equipment. UA provides each student everything they will need through an advanced Cloud-based Virtual Learning Environment. Students only require a broadband Internet connection and either a Windows, Mac, or Linux computer to access their learning resources. High performance desktops, advanced Cyber tools, and the world class CyberApolis virtual city are all preconfigured and provided to each student so they can focus on learning.

Gears Icon

Engineering Track

The Engineering Track is a deeply technical, interdisciplinary, security focused Computer Science program. The Engineering Track meets the National Security Agency (NSA) Center of Academic Excellence in Cyber Operations (CAE-CO) academic requirements.

See sample program schedule

Defense and Forensics Track

The Defense & Forensics Track is an interdisciplinary Cyber education program. The Defense & Forensics Track conforms to academic requirements from both the National Security Agency’s Centers of Academic Excellence in Cyber Operations (CAE-CO) and Cyber Defense (CAE-CD).

See sample program schedule

 

 

Courses

CYBV385 Introduction to Cyber Operations

CYBV 385 provides students an introduction to the concepts of Confidentiality, Integrity, and Availability (CIA) basics together with authentication and non-repudiation; vulnerabilities; security principles and testing; operating systems; and cryptography. CYBV 385 meets the National Security Agency (NSA) Center of Academic Excellence in Cyber Operations...

View details

CYBV388 Cyber Investigations and Forensics

CYBV 388 provides students with an understanding of intrusion detection methodologies, tools, and approaches to incident response; examination of computer forensic principles, including operating system concepts, registry structures, file system concepts, boot process, low level hardware calls, and file operations; and an exploration of the ethical...

View details

NETV379 Cloud Computing: Theories and Application

NETV 379 provides students an introduction to the concepts of cloud computing and a clear understanding of the variety, complexity, and capabilities of modern cloud platforms. The student will learn how to deploy web services in a cloud computing environment and how to scale capabilities using orchestration and automation...

View details

CSCV352 System Programming and Unix

CSCV352 is designed to develop an understanding of the various components of the Unix operating system from both a system user’s perspective and a system programmer’s perspective including both the shell and programming interfaces; to write sophisticated C applications using multiple source files and separate compilation; and to implement...

View details

CSCV452 Principles of Operating Systems

CSCV452 covers the principles and concepts that govern the design of modern computer operating systems. In general terms, the course covers the two primary functions of an operating system: insulating users and applications from details of the computer hardware, and managing the allocation of resources to improve efficiency. Specific topics covered...

View details

CYBV400 Active Cyber Defense

CYBV 400 will provide students with an introduction to the policies, techniques and operational capabilities and limitations of implementing an Active Cyber Defense program. A broad survey of development of defensible network architectures; integration of passive defensive technologies; consumption and production of Cyber Threat...

View details

CYBV454 Malware Threats & Analysis

CYBV/INFV 454 provides students a methodology to safely perform static and dynamic analysis of software of potentially unknown origin, including obfuscated malware, to fully understand the software's functionality and specifications. Students will use hands- on labs and exercises to examine the fundamental principles of malware analysis and...

View details

CYBV471 Assembly Programming for Security Professionals

CYBV471 will provide students with an introduction to assembly language programming. Students will use hands-on labs and exercises to practice and implement applications developed in the x86-64 Assembly programming language. CYBV471 meets the National Security Agency (NSA) Center of Academic Excellence in Cyber Operations...

View details

CYBV472 Secure Software Development & Assessment

CYBV 472 will provide students with an introduction to the secure software development process as well as how to conduct a software security analysis to safely perform static and dynamic analysis of software of potentially unknown origin, including obfuscated malware, to detect the presence of weaknesses that may lead to exploitable...

View details

CYBV479 Wireless Networking & Security

CYBV479 provides students an introduction to wireless networking, mobile device hardware and software architectures as well as the application of security fundamentals for mobile computing systems. Students will be able to describe user associations and routing in a cellular/mobile network, interaction of elements within the...

View details

CYBV480 Cyber Warfare

CYBV 480 will provide students with an introduction to cyber warfare along with its policy, doctrine, and operational constraints. A broad survey of cyber tools, techniques and procedures will be presented, and students will use hands-on labs to practice and implement attack methodologies. CYBV 480 meets the National Security Agency (NSA) Center of...

View details

CYBV498 Cyber Operations Senior Capstone

CYBV 498 is designed to provide Cyber Operations majors with a capstone experience emphasizing integration of knowledge acquired in previous courses. The course provides a culminating experience for majors involving a substantive project that demonstrates a synthesis of learning accumulated in the major, including broadly...

View details

CYBV301 Fundamentals of Cybersecurity

CYBV 301 will provide students with an introduction to the fundamentals of cybersecurity, which will include an introduction to cyber security. A broad survey of cybersecurity concepts, tools, technologies and best practices will be presented. Students will use hands-on activities to become familiar with and practice...

View details

CYBV326 Introductory Methods of Network Analysis

CYBV/BASV 326 provides students a methodology for analyzing networks by examining the network at its infrastructure, network and applications layers; exploring how they transfer data; investigating how network protocols work to enable communication; and probing and analyzing how the lower-level network layers support the upper ones...

View details

BASV376 Mathematics for Applied Technology

BASV/RNCV 376 provides students an introduction to algorithm analysis, cryptographic methods, entropy, finite automaton and the discrete mathematics underlying these techniques. BASV 376 meets the National Security Agency (NSA) Center of Academic Excellence in Cyber Operations (CAE-CO) academic requirements for Discrete Math and Algorithms...

View details

INFV320 Computational Thinking & Doing

INFV320 covers basics of programming and techniques used by computing professionals in a variety of application areas. Topics include computation, programs, algorithms, programming languages, complexity, and computability. The course also explores how these concepts and techniques are applied in Informatics...

View details

 

 

CYBV385 Introduction to Cyber Operations

CYBV 385 provides students an introduction to the concepts of Confidentiality, Integrity, and Availability (CIA) basics together with authentication and non-repudiation; vulnerabilities; security principles and testing; operating systems; and cryptography. CYBV 385 meets the National Security Agency (NSA) Center of Academic Excellence in Cyber Operations...

View details

CYBV388 Cyber Investigations and Forensics

CYBV 388 provides students with an understanding of intrusion detection methodologies, tools, and approaches to incident response; examination of computer forensic principles, including operating system concepts, registry structures, file system concepts, boot process, low level hardware calls, and file operations; and an exploration of the ethical...

View details

CYBV400 Active Cyber Defense

CYBV 400 will provide students with an introduction to the policies, techniques and operational capabilities and limitations of implementing an Active Cyber Defense program. A broad survey of development of defensible network architectures; integration of passive defensive technologies; consumption and production of Cyber Threat...

View details

CYBV435 Cyber Threat Intelligence

CYBV435 will provide students with an in-depth investigation of threat actors and the techniques they employ to attack networks. Students will research threat capabilities and objectives. Formal ethical hacking methodology including reconnaissance, scanning and enumeration, gaining access, escalation of privilege, maintaining...

View details

CYBV436 Counter Cyber Threat Intelligence

CYBV 436 will provide students with an in-depth examination of the tactics, techniques and procedures used to conduct online anonymization and attribution. An extensive analysis of the concepts, technologies, and best practices will be presented. Students will use interactive activities to become familiar with and practice the protection...

View details

CYBV454 Malware Threats & Analysis

CYBV/INFV 454 provides students a methodology to safely perform static and dynamic analysis of software of potentially unknown origin, including obfuscated malware, to fully understand the software's functionality and specifications. Students will use hands- on labs and exercises to examine the fundamental principles of malware analysis and...

View details

CYBV477 Advanced Computer Forensics

NETV/CYBV 477 is an advanced computer forensics course that provides students an in depth knowledge of network forensics, network flow analysis, network intrusion detection systems, event reconstruction and memory forensics for Windows, Linux and MAC operating systems.

View details

CYBV479 Wireless Networking & Security

CYBV479 provides students an introduction to wireless networking, mobile device hardware and software architectures as well as the application of security fundamentals for mobile computing systems. Students will be able to describe user associations and routing in a cellular/mobile network, interaction of elements within the...

View details

CYBV480 Cyber Warfare

CYBV 480 will provide students with an introduction to cyber warfare along with its policy, doctrine, and operational constraints. A broad survey of cyber tools, techniques and procedures will be presented, and students will use hands-on labs to practice and implement attack methodologies. CYBV 480 meets the National Security Agency (NSA) Center of...

View details

CYBV481 Social Engineering Attacks & Defenses

CYBV 481 will provide students with an advanced analysis of the tactics, techniques, and tools used to conduct and defend against Social Engineering attacks. A survey of why social engineering attacks are among the most effective Cyber-attack mechanisms and what can be done to mitigate them will be presented. Students...

View details

CYBV498 Cyber Operations Senior Capstone

CYBV 498 is designed to provide Cyber Operations majors with a capstone experience emphasizing integration of knowledge acquired in previous courses. The course provides a culminating experience for majors involving a substantive project that demonstrates a synthesis of learning accumulated in the major, including broadly...

View details

CYBV301 Fundamentals of Cybersecurity

CYBV 301 will provide students with an introduction to the fundamentals of cybersecurity, which will include an introduction to cyber security. A broad survey of cybersecurity concepts, tools, technologies and best practices will be presented. Students will use hands-on activities to become familiar with and practice...

View details

CYBV326 Introductory Methods of Network Analysis

CYBV/BASV 326 provides students a methodology for analyzing networks by examining the network at its infrastructure, network and applications layers; exploring how they transfer data; investigating how network protocols work to enable communication; and probing and analyzing how the lower-level network layers support the upper ones...

View details

CYBV473 Violent Python

CYBV 473 will provide students with advanced practical applications of Python programming to support offensive and defensive cybersecurity operations. A crosscut of Python concepts, tools, and techniques will be presented. Students will use interactive programming activities to master and create advanced Python tools to...

View details

INFV320 Computational Thinking & Doing

INFV320 covers basics of programming and techniques used by computing professionals in a variety of application areas. Topics include computation, programs, algorithms, programming languages, complexity, and computability. The course also explores how these concepts and techniques are applied in Informatics...

View details

Cyberapolis

Curriculum