Bachelor of Applied Science
The Bachelor of Applied Science in Cyber Operations gives students extensive hands-on experience and develops the knowledge, skills and abilities necessary to succeed in defense, law enforcement and private industry.
One of only 21 NSA-designated programs nationwide
Rising cyber crime has created a global shortage of information security professionals, transforming this field into one of immense growth and opportunities. The Cyber Operations degree equips you to enter those roles and meet that demand.
The curriculum delivers offensive and defensive cyber security content within our state-of-the-art Cyber Virtual Learning Environment, which allows you to gain extensive hands-on experience and develop the knowledge, skills and abilities necessary to succeed after graduating. In addition, the Cyber Operations degrees offers three degree emphases: Engineering, Defense & Forensics, and Cyber Law & Policy.
The National Security Agency has designated the University of Arizona’s Cyber Operations program as a Center of Academic Excellence in Cyber Operations (CAE-CO). With this designation, UA joins an extremely exclusive group of only 20 programs in the nation. The NSA’s CAE-CO designation demonstrates that UA’s Cyber Operations program meets the most demanding academic and technical requirements.
This degree is designed for students transferring approximately 60 credits from a regionally accredited institution. During the application process, the submission of a resume and goal statement is required for professional admission to the program. Before applying, we recommend that you discuss your background with a program adviser. Contact firstname.lastname@example.org or 520-621-0898 for a referral.
For more detailed program overview visit the Cyber Operations Program Page
Cost & Eligibility
Courses in the Cyber Operations degree combine hands-on cyber activities in a virtual learning environment with a strong academic educational experience.
Cyber Engineering Emphasis Courses:
- CYBV 454: Malware Threats & Analysis - Acquisition of the methodologies used to safely perform static and dynamic analysis of software of potentially unknown origin, including obfuscated malwares, to fully understand the software's functionality and specifications.
- CYBV 480: Cyber Warfare - A broad survey of cyber warfare tools, techniques and procedures, as well as cyber warfare policy, doctrines, and constraints.
Defense & Forensics Emphasis Courses:
- CYBV 388: Cyber Investigations and Forensics – Study of intrusion detection methodologies, tools, and approaches to incident response; examination of computer forensic principles, including operating system concepts, registry structures, file system concepts, boot process, low-level hardware calls, and file operations.
- CYBV 400: Active Cyber Defense - Introduction to the policies, techniques, and operational capabilities and limitations involved in implementing defensible network architectures.
Cyber Law & Policy Emphasis Courses:
- CYBV 435: Cyber Threat Intelligence – An in-depth investigation of threat actors and the techniques they employ to attack networks. Formal ethical hacking methodology including reconnaissance, scanning and enumeration, gaining access, escalation of privilege, maintain access and reporting is examined.
- GPSV 314: National Security Policy - Decision-making structures, processes, and outcomes relevant to American security policy; comparison with major foreign powers.
The Engineering Track is a deeply technical, interdisciplinary, security-focused computer science program that meets the NSA Center of Academic Excellence in Cyber Operations (CAE-CO) academic requirements.
Defense & Forensics Track
The Defense & Forensics Track is an interdisciplinary cyber education program that conforms to academic requirements from the NSA’s Centers of Academic Excellence in Cyber Operations (CAE-CO) and Cyber Defense (CAE-CD).
Cyber Law & Policy
The Cyber Law & Policy emphasis is a unique program that combines highly technical, hands-on cyber curriculum with a strong foundation in national and international law, strategy, and policy relevant to cyber professionals. The technical cyber courses conform to the academic requirements from both the National Security Agency’s Centers of Academic Excellence in Cyber Operations (CAE-CO) and Cyber Defense (CAE-CD).
Cyber Operations Experience Overview
Jason Denno, University of Arizona director of Cyber Operations, explains how the online Cyber Operations program prepares graduates to face the challenges of a data-driven future.