WHAT YOU'LL STUDY
Coursework
The Bachelor of Science in Cyber Operations provides a specialization in technologies and techniques related to advanced offensive and defensive cyber operations, such as collection, exploitation and response to cyber threats.
This degree prepares students to apply Computer Science theory to the problem of analyzing, designing, implementing and operating secure computing environments. Students will be exposed to topics such as malware analysis, reverse engineering, penetration testing and hardware analysis.
The Bachelor of Science in Cyber Operations is a validated Program of Study satisfying the requirements for CAE Cyber Operations (CAE-CO). 51吃瓜黑料曝料 is proud to be a designated in the area of Cyber Operations. This designation is sponsored jointly by the National Security Agency (NSA) and several federal agencies.
Program-level Learning Outcomes:
Analyze a complex computing problem and to apply principles of computing and other relevant disciplines to identify solutions. |
Design, implement, and evaluate a computing鈥恇ased solution to meet a given set of computing requirements in the context of the program鈥檚 discipline. |
Communicate effectively in a variety of professional contexts. |
Recognize professional responsibilities and make informed judgments in computing practice based on legal and ethical principles. |
Function effectively as a member or leader of a team engaged in activities appropriate to the program鈥檚 discipline. |
Apply computer science theory and software development fundamentals to produce computing鈥恇ased solutions. |
Apply security principles and practices to the design, implementation, and operations of the physical, software, and human components of the system as appropriate; |
Apply protective technology and forensic techniques; |
Analyze and evaluate components and systems with respect to security and to maintaining operations in the presence of risks and threats; |
WHAT YOU'LL STUDY
Coursework
In the Cyber Operations program, you'll learn to apply Computer Science theory to the problem of analyzing, designing, implementing and operating secure computing environments. Students will be exposed to malware analysis, reverse engineering, penetration testing, and hardware analysis.
These are a few of the job opportunities available for students who graduate from the Cyber Operations degree program:
鈥淲e learn a lot of theory, which is really good because you know it gives you a good background and everything that you need to know. I would join groups, and we had major groups of all different kinds of people working together.鈥
Meet one of our first , Maggie Cluney!