The Cyber Operations Bachelor of Applied Science (BAS) degree is an advanced upper division Junior/Senior level program.
Students begin classes in the program once they have completed their preparatory Freshman/Sophomore lower division coursework. Lower division pathways exist for Arizona Online, numerous community colleges, as well as other academic and military institutions. We will help you define the courses you need whether you are a Freshman/Sophomore or ready to start your Cyber Ops BAS degree. Find out what sets our program apart.
Curriculum Delivery
UA offers the Cyber Operations BAS degree in Face-to-Face, Hybrid, and Fully Online formats. We have carefully crafted our courses to ensure that students receive the exact same learning experience regardless of which learning modality they choose. Every Cyber Operations course provides live-synchronous lectures and hands-on exercise, utilizing relevant and up to date course materials. All online lectures are recorded and made available for students whose schedules do not allow them to attend the synchronous class meetings. Moreover, our UA Cyber Operations faculty are available to support student learning through both scheduled office hours and online live support.
Hands-On Learning
UA Cyber Operations courses are structured to maximize the ability to learn by doing. Cyber is a highly technical field that requires hands-on experience to master the material. UA Cyber courses maximize the opportunity for students to gain the hands-on experience they will need to be successful cyber professionals. Students not only have to learn the concepts and technologies, they must demonstrate they have mastered the course content through hands-on exercises and interactive assessments.
Cloud Computing
There is no need for high performance, expensive computer equipment. UA provides each student everything they will need through an advanced Cloud-based Virtual Learning Environment. Students only require a broadband Internet connection and either a Windows, Mac, or Linux computer to access their learning resources. High performance desktops, advanced Cyber tools, and the world class CyberApolis virtual city are all preconfigured and provided to each student so they can focus on learning.
Engineering Track
The Engineering Track is a deeply technical, interdisciplinary, security focused Computer Science program. The Engineering Track meets the National Security Agency (NSA) Center of Academic Excellence in Cyber Operations (CAE-CO) academic requirements.
Defense and Forensics Track
The Defense & Forensics Track is an interdisciplinary Cyber education program. The Defense & Forensics Track conforms to academic requirements from both the National Security Agency’s Centers of Academic Excellence in Cyber Operations (CAE-CO) and Cyber Defense (CAE-CD).
Law & Policy Track
The Law & Policy track is a multidisciplinary Cyber education program that lays a strong technical foundation, integrated with the legal and policy knowledge necessary to interact at the executive level. The Law & Policy track conforms with academic requirements from both the National Security Agency’s Centers of Academic Excellence in Cyber Operations (CAE-CO) and Cyber Defense (CAE-CD).
Courses
BASV300 Introduction to Discrete Mathematics
BASV300 provides...
BASV376 Mathematics for Applied Technology
BASV/RNCV 376 provides students an introduction to algorithm analysis, cryptographic methods, entropy, finite automaton and the discrete mathematics underlying these techniques. BASV 376 meets the National Security Agency (NSA) Center of Academic Excellence in Cyber Operations (CAE-CO) academic requirements for Discrete Math and Algorithms...
CSCV452 Principles of Operating Systems
CSCV452 covers the principles and concepts that govern the design of modern computer operating systems. In general terms, the course covers the two primary functions of an operating system: insulating users and applications from details of the computer hardware, and managing the allocation of resources to improve efficiency. Specific topics covered...
CYBV301 Fundamentals of Cybersecurity
CYBV 301 will provide students with an introduction to the fundamentals of cybersecurity, which will include an introduction to cyber security. A broad survey of cybersecurity concepts, tools, technologies and best practices will be presented. Students will use hands-on activities to become familiar with and practice...
CYBV310 Introduction to Security Programming I
CYBV310 provides students with an introduction to C programming. Students will use hands-on exercises to practice and implement applications developed in the C programming language on an x86 processors. Students will learn how to write business applications as well as small utilities programs. Students will gain a good grasp of debugging...
CYBV311 Introduction to Security Programming II
CYBV311 provides students with an introduction to Assembly programming. Students will use hands-on exercises to practice and implement applications developed in the Assembly programming language on an x86 processors. Students will have a deeper understanding of data representation, mathematical manipulation, subroutine linkage, machine encoding...
CYBV326 Introductory Methods of Network Analysis
CYBV/BASV 326 provides students a methodology for analyzing networks by examining the network at its infrastructure, network and applications layers; exploring how they transfer data; investigating how network protocols work to enable communication; and probing and analyzing how the lower-level network layers support the upper ones...
CYBV329 Cyber Law, Ethics, and Policy
CYBV329 consists of a sustained study of ethical and legal issues that arise in relation to employment in the public and private sectors, including allocation of resources, corporate and social responsibility, relationships, and discrimination. A main focus of this course will be on the ethical and legal standards governing information technology. New technology creates ethical challenges for individuals around the globe...
CYBV385 Introduction to Cyber Operations
CYBV 385 provides students an introduction to the concepts of Confidentiality, Integrity, and Availability (CIA) basics together with authentication and non-repudiation; vulnerabilities; security principles and testing; operating systems; and cryptography. CYBV 385 meets the National Security Agency (NSA) Center of Academic Excellence in Cyber Operations...
CYBV388 Cyber Investigations and Forensics
CYBV 388 provides students with an understanding of intrusion detection methodologies, tools, and approaches to incident response; examination of computer forensic principles, including operating system concepts, registry structures, file system concepts, boot process, low level hardware calls, and file operations; and an exploration of the ethical...
CYBV400 Active Cyber Defense
CYBV 400 will provide students with an introduction to the policies, techniques and operational capabilities and limitations of implementing an Active Cyber Defense program. A broad survey of development of defensible network architectures; integration of passive defensive technologies; consumption and production of Cyber Threat...
CYBV454 Malware Threats & Analysis
CYBV/INFV 454 provides students a methodology to safely perform static and dynamic analysis of software of potentially unknown origin, including obfuscated malware, to fully understand the software's functionality and specifications. Students will use hands- on labs and exercises to examine the fundamental principles of malware analysis and...
CYBV470 C Programming for Security Professionals
CYBV470 provides students with an introduction to C programming. Students will use hands-on labs and exercises to practice and implement applications developed in the C programming language.
CYBV471 Assembly Programming for Security Professionals
CYBV471 will provide students with an introduction to assembly language programming. Students will use hands-on labs and exercises to practice and implement applications developed in the x86-64 Assembly programming language. CYBV471 meets the National Security Agency (NSA) Center of Academic Excellence in Cyber Operations...
CYBV472 Secure Software Development & Assessment
CYBV 472 will provide students with an introduction to the secure software development process as well as how to conduct a software security analysis to safely perform static and dynamic analysis of software of potentially unknown origin, including obfuscated malware, to detect the presence of weaknesses that may lead to exploitable...
CYBV473 Violent Python
CYBV 473 will provide students with advanced practical applications of Python programming to support offensive and defensive cybersecurity operations. A crosscut of Python concepts, tools, and techniques will be presented. Students will use interactive programming activities to master and create advanced Python tools to...
CYBV479 Wireless Networking & Security
CYBV479 provides students an introduction to wireless networking, mobile device hardware and software architectures as well as the application of security fundamentals for mobile computing systems. Students will be able to describe user associations and routing in a cellular/mobile network, interaction of elements within the...
CYBV480 Cyber Warfare
CYBV 480 will provide students with an introduction to cyber warfare along with its policy, doctrine, and operational constraints. A broad survey of cyber tools, techniques and procedures will be presented, and students will use hands-on labs to practice and implement attack methodologies. CYBV 480 meets the National Security Agency (NSA) Center of...
CYBV498 Cyber Operations Senior Capstone
CYBV 498 is designed to provide Cyber Operations majors with a capstone experience emphasizing integration of knowledge acquired in previous courses. The course provides a culminating experience for majors involving a substantive project that demonstrates a synthesis of learning accumulated in the major, including broadly...
ENGV306 Advanced Composition
ENGV306 studies genre and rhetorical situation; advanced practice in expository writing.
INFV320 Computational Thinking & Doing
INFV320 covers basics of programming and techniques used by computing professionals in a variety of application areas. Topics include computation, programs, algorithms, programming languages, complexity, and computability. The course also explores how these concepts and techniques are applied in Informatics...
NETV379 Cloud Computing: Theories and Application
NETV 379 provides students an introduction to the concepts of cloud computing and a clear understanding of the variety, complexity, and capabilities of modern cloud platforms. The student will learn how to deploy web services in a cloud computing environment and how to scale capabilities using orchestration and automation...
CYBV301 Fundamentals of Cybersecurity
CYBV 301 will provide students with an introduction to the fundamentals of cybersecurity, which will include an introduction to cyber security. A broad survey of cybersecurity concepts, tools, technologies and best practices will be presented. Students will use hands-on activities to become familiar with and practice...
CYBV302 Linux Security Essentials
CYBV302 provides students with an in-depth analysis of Linux and Unix security issues. This includes configuration guidance using industry standards and benchmarks and implementation through practical, real world examples. The course will examine how to mitigate or eliminate general problems that apply to Nix like OSs, including vulnerabilities in...
CYBV303 Windows Security Essentials
provides students with the foundational knowledge of the Windows Operating System and securing Windows environments including; learning PowerShell scripting, host hardening and active directory scripting, smart tokens and Public Key Infrastructure (PKI), protecting admin credentials, and thwarting hackers inside the network. Students will...
CYBV326 Introductory Methods of Network Analysis
CYBV/BASV 326 provides students a methodology for analyzing networks by examining the network at its infrastructure, network and applications layers; exploring how they transfer data; investigating how network protocols work to enable communication; and probing and analyzing how the lower-level network layers support the upper ones...
CYBV329 Cyber Law, Ethics, and Policy
CYBV329 consists of a sustained study of ethical and legal issues that arise in relation to employment in the public and private sectors, including allocation of resources, corporate and social responsibility, relationships, and discrimination. A main focus of this course will be on the ethical and legal standards governing information technology. New technology creates ethical challenges for individuals around the globe...
CYBV354 Principles of Open Source Intelligence (OSINT)
CYBV354 provide students with an overview of the fundamentals of Open Source Intelligence. Students will be presented with the most effective methodologies used by cyber professionals, law enforcement, and other investigative personnel to locate and analyze information on the Internet and Dark Web. Students will use interactive...
CYBV385 Introduction to Cyber Operations
CYBV 385 provides students an introduction to the concepts of Confidentiality, Integrity, and Availability (CIA) basics together with authentication and non-repudiation; vulnerabilities; security principles and testing; operating systems; and cryptography. CYBV 385 meets the National Security Agency (NSA) Center of Academic Excellence in Cyber Operations...
CYBV388 Cyber Investigations and Forensics
CYBV 388 provides students with an understanding of intrusion detection methodologies, tools, and approaches to incident response; examination of computer forensic principles, including operating system concepts, registry structures, file system concepts, boot process, low level hardware calls, and file operations; and an exploration of the ethical...
CYBV400 Active Cyber Defense
CYBV 400 will provide students with an introduction to the policies, techniques and operational capabilities and limitations of implementing an Active Cyber Defense program. A broad survey of development of defensible network architectures; integration of passive defensive technologies; consumption and production of Cyber Threat...
CYBV435 Cyber Threat Intelligence
CYBV435 will provide students with an in-depth investigation of threat actors and the techniques they employ to attack networks. Students will research threat capabilities and objectives. Formal ethical hacking methodology including reconnaissance, scanning and enumeration, gaining access, escalation of privilege, maintaining...
CYBV436 Counter Cyber Threat Intelligence
CYBV 436 will provide students with an in-depth examination of the tactics, techniques and procedures used to conduct online anonymization and attribution. An extensive analysis of the concepts, technologies, and best practices will be presented. Students will use interactive activities to become familiar with and practice the protection...
CYBV454 Malware Threats & Analysis
CYBV/INFV 454 provides students a methodology to safely perform static and dynamic analysis of software of potentially unknown origin, including obfuscated malware, to fully understand the software's functionality and specifications. Students will use hands- on labs and exercises to examine the fundamental principles of malware analysis and...
CYBV473 Violent Python
CYBV 473 will provide students with advanced practical applications of Python programming to support offensive and defensive cybersecurity operations. A crosscut of Python concepts, tools, and techniques will be presented. Students will use interactive programming activities to master and create advanced Python tools to...
CYBV474 Advanced Analytics for Security Operations
CYBV474 provides students an in-depth examination of how the Python scripting language can be used to support advanced analysis in offensive and defensive security operations. Students will use hands-on scripting exercises to evaluate the strengths and weaknesses of automated tools to solve complex security-related problems; practice...
CYBV479 Wireless Networking & Security
CYBV479 provides students an introduction to wireless networking, mobile device hardware and software architectures as well as the application of security fundamentals for mobile computing systems. Students will be able to describe user associations and routing in a cellular/mobile network, interaction of elements within the...
CYBV480 Cyber Warfare
CYBV 480 will provide students with an introduction to cyber warfare along with its policy, doctrine, and operational constraints. A broad survey of cyber tools, techniques and procedures will be presented, and students will use hands-on labs to practice and implement attack methodologies. CYBV 480 meets the National Security Agency (NSA) Center of...
CYBV481 Social Engineering Attacks & Defenses
CYBV 481 will provide students with an advanced analysis of the tactics, techniques, and tools used to conduct and defend against Social Engineering attacks. A survey of why social engineering attacks are among the most effective Cyber-attack mechanisms and what can be done to mitigate them will be presented. Students...
CYBV498 Cyber Operations Senior Capstone
CYBV 498 is designed to provide Cyber Operations majors with a capstone experience emphasizing integration of knowledge acquired in previous courses. The course provides a culminating experience for majors involving a substantive project that demonstrates a synthesis of learning accumulated in the major, including broadly...
ENGV306 Advanced Composition
ENGV306 studies genre and rhetorical situation; advanced practice in expository writing.
INFV320 Computational Thinking & Doing
INFV320 covers basics of programming and techniques used by computing professionals in a variety of application areas. Topics include computation, programs, algorithms, programming languages, complexity, and computability. The course also explores how these concepts and techniques are applied in Informatics...
NETV379 Cloud Computing: Theories and Application
NETV 379 provides students an introduction to the concepts of cloud computing and a clear understanding of the variety, complexity, and capabilities of modern cloud platforms. The student will learn how to deploy web services in a cloud computing environment and how to scale capabilities using orchestration and automation...
NETV477 Advanced Cyber Forensics
NETV/CYBV 477 is an advanced computer forensics course that provides students an in depth knowledge of network forensics, network flow analysis, network intrusion detection systems, event reconstruction and memory forensics for Windows, Linux and MAC operating systems.
BASV314 Mathematics for Applied Sciences
BASV 314 will examine applications of probability, statistics, data analysis, hypothesis testing, apportionment and scheduling to the applied sciences. Registration requires a passing grade on the UA South BAS Math Readiness test.
CYBV301 Fundamentals of Cybersecurity
CYBV 301 will provide students with an introduction to the fundamentals of cybersecurity, which will include an introduction to cyber security. A broad survey of cybersecurity concepts, tools, technologies and best practices will be presented. Students will use hands-on activities to become familiar with and practice...
CYBV302 Linux Security Essentials
CYBV302 provides students with an in-depth analysis of Linux and Unix security issues. This includes configuration guidance using industry standards and benchmarks and implementation through practical, real world examples. The course will examine how to mitigate or eliminate general problems that apply to Nix like OSs, including vulnerabilities in...
CYBV303 Windows Security Essentials
provides students with the foundational knowledge of the Windows Operating System and securing Windows environments including; learning PowerShell scripting, host hardening and active directory scripting, smart tokens and Public Key Infrastructure (PKI), protecting admin credentials, and thwarting hackers inside the network. Students will...
CYBV326 Introductory Methods of Network Analysis
CYBV/BASV 326 provides students a methodology for analyzing networks by examining the network at its infrastructure, network and applications layers; exploring how they transfer data; investigating how network protocols work to enable communication; and probing and analyzing how the lower-level network layers support the upper ones...
CYBV329 Cyber Law, Ethics, and Policy
CYBV329 consists of a sustained study of ethical and legal issues that arise in relation to employment in the public and private sectors, including allocation of resources, corporate and social responsibility, relationships, and discrimination. A main focus of this course will be on the ethical and legal standards governing information technology. New technology creates ethical challenges for individuals around the globe...
CYBV385 Introduction to Cyber Operations
CYBV 385 provides students an introduction to the concepts of Confidentiality, Integrity, and Availability (CIA) basics together with authentication and non-repudiation; vulnerabilities; security principles and testing; operating systems; and cryptography. CYBV 385 meets the National Security Agency (NSA) Center of Academic Excellence in Cyber Operations...
CYBV400 Active Cyber Defense
CYBV 400 will provide students with an introduction to the policies, techniques and operational capabilities and limitations of implementing an Active Cyber Defense program. A broad survey of development of defensible network architectures; integration of passive defensive technologies; consumption and production of Cyber Threat...
CYBV435 Cyber Threat Intelligence
CYBV435 will provide students with an in-depth investigation of threat actors and the techniques they employ to attack networks. Students will research threat capabilities and objectives. Formal ethical hacking methodology including reconnaissance, scanning and enumeration, gaining access, escalation of privilege, maintaining...
CYBV436 Counter Cyber Threat Intelligence
CYBV 436 will provide students with an in-depth examination of the tactics, techniques and procedures used to conduct online anonymization and attribution. An extensive analysis of the concepts, technologies, and best practices will be presented. Students will use interactive activities to become familiar with and practice the protection...
CYBV440 Digital Espionage
CYBV440 will provide students with a comprehensive overview of the concepts, tactics, techniques adversaries use to steal secrets for political or economic reasons. Students will analyze case studies to become familiar with how to detect, identify, and mitigate digital espionage operations and the actors who conduct them.
CYBV441 Cyber War, Terror & Crime
CYBV441 prepares students to perform analyses of major cyber events to determine contextual relevance and possible threat actor intentions. Using case studies, students will conduct an analytic examination of the similarities and differences among discrete cyber events to determine whether an event presents as possible criminal activity, terrorist activity, or rises to the level of an act of war.
CYBV473 Violent Python
CYBV 473 will provide students with advanced practical applications of Python programming to support offensive and defensive cybersecurity operations. A crosscut of Python concepts, tools, and techniques will be presented. Students will use interactive programming activities to master and create advanced Python tools to...
CYBV498 Cyber Operations Senior Capstone
CYBV 498 is designed to provide Cyber Operations majors with a capstone experience emphasizing integration of knowledge acquired in previous courses. The course provides a culminating experience for majors involving a substantive project that demonstrates a synthesis of learning accumulated in the major, including broadly...
ENGV306 Advanced Composition
ENGV306 studies genre and rhetorical situation; advanced practice in expository writing.
GPSV442 International Law
GPSV442 studies the international state system; legal-political problems, including territory, environment, seas.
INTV461 Civil Liberties & the US Constitution
INTV461 analyzes the constitutional guarantees of civil liberties in the U.S. Constitution
INFV320 Computational Thinking & Doing
INFV320 covers basics of programming and techniques used by computing professionals in a variety of application areas. Topics include computation, programs, algorithms, programming languages, complexity, and computability. The course also explores how these concepts and techniques are applied in Informatics...