BECOME A
CYBER OPerations
PROFESSIONAL

UA delivers highly technical Cyber content through its world class Virtual Learning Environment to ensure our students gain the hands-on knowledge, skills, and abilities necessary to excel in the Cyber field.

The Cyber Operations Bachelor of Applied Science (BAS) degree is an advanced upper division Junior/Senior level program.

Students begin classes in the program once they have completed their preparatory Freshman/Sophomore lower division coursework. Lower division pathways exist for Arizona Online, numerous community colleges, as well as other academic and military institutions. We will help you define the courses you need whether you are a Freshman/Sophomore or ready to start your Cyber Ops BAS degree. Find out what sets our program apart.

Students at Computer

Curriculum Delivery

UA offers the Cyber Operations BAS degree in Face-to-Face, Hybrid, and Fully Online formats. We have carefully crafted our courses to ensure that students receive the exact same learning experience regardless of which learning modality they choose. Every Cyber Operations course provides live-synchronous lectures and hands-on exercise, utilizing relevant and up to date course materials. All online lectures are recorded and made available for students whose schedules do not allow them to attend the synchronous class meetings. Moreover, our UA Cyber Operations faculty are available to support student learning through both scheduled office hours and online live support.

Hands at Computer

Hands-On Learning

UA Cyber Operations courses are structured to maximize the ability to learn by doing. Cyber is a highly technical field that requires hands-on experience to master the material. UA Cyber courses maximize the opportunity for students to gain the hands-on experience they will need to be successful cyber professionals. Students not only have to learn the concepts and technologies, they must demonstrate they have mastered the course content through hands-on exercises and interactive assessments.

Cloud Network

Cloud Computing

There is no need for high performance, expensive computer equipment. UA provides each student everything they will need through an advanced Cloud-based Virtual Learning Environment. Students only require a broadband Internet connection and either a Windows, Mac, or Linux computer to access their learning resources. High performance desktops, advanced Cyber tools, and the world class CyberApolis virtual city are all preconfigured and provided to each student so they can focus on learning.

Gears Icon

Engineering Track

The Engineering Track is a deeply technical, interdisciplinary, security focused Computer Science program. The Engineering Track meets the National Security Agency (NSA) Center of Academic Excellence in Cyber Operations (CAE-CO) academic requirements.

See sample program schedule

Defense and Forensics Track

The Defense & Forensics Track is an interdisciplinary Cyber education program. The Defense & Forensics Track conforms to academic requirements from both the National Security Agency’s Centers of Academic Excellence in Cyber Operations (CAE-CO) and Cyber Defense (CAE-CD).

See sample program schedule

Law & Policy Track

The Law & Policy track is a multidisciplinary Cyber education program that lays a strong technical foundation, integrated with the legal and policy knowledge necessary to interact at the executive level. The Law & Policy track conforms with academic requirements from both the National Security Agency’s Centers of Academic Excellence in Cyber Operations (CAE-CO) and Cyber Defense (CAE-CD).

See sample program schedule

Courses

BASV300 Introduction to Discrete Mathematics

BASV300 provides...

BASV376 Mathematics for Applied Technology

BASV/RNCV 376 provides students an introduction to algorithm analysis, cryptographic methods, entropy, finite automaton and the discrete mathematics underlying these techniques. BASV 376 meets the National Security Agency (NSA) Center of Academic Excellence in Cyber Operations (CAE-CO) academic requirements for Discrete Math and Algorithms...

View details

CSCV452 Principles of Operating Systems

CSCV452 covers the principles and concepts that govern the design of modern computer operating systems. In general terms, the course covers the two primary functions of an operating system: insulating users and applications from details of the computer hardware, and managing the allocation of resources to improve efficiency. Specific topics covered...

View details

CYBV301 Fundamentals of Cybersecurity

CYBV 301 will provide students with an introduction to the fundamentals of cybersecurity, which will include an introduction to cyber security. A broad survey of cybersecurity concepts, tools, technologies and best practices will be presented. Students will use hands-on activities to become familiar with and practice...

View details

CYBV310 Introduction to Security Programming I

CYBV310 provides students with an introduction to C programming. Students will use hands-on exercises to practice and implement applications developed in the C programming language on an x86 processors. Students will learn how to write business applications as well as small utilities programs. Students will gain a good grasp of debugging...

View details

CYBV311 Introduction to Security Programming II

CYBV311 provides students with an introduction to Assembly programming. Students will use hands-on exercises to practice and implement applications developed in the Assembly programming language on an x86 processors. Students will have a deeper understanding of data representation, mathematical manipulation, subroutine linkage, machine encoding...

View details

CYBV326 Introductory Methods of Network Analysis

CYBV/BASV 326 provides students a methodology for analyzing networks by examining the network at its infrastructure, network and applications layers; exploring how they transfer data; investigating how network protocols work to enable communication; and probing and analyzing how the lower-level network layers support the upper ones...

View details

CYBV329 Cyber Law, Ethics, and Policy

CYBV329 consists of a sustained study of ethical and legal issues that arise in relation to employment in the public and private sectors, including allocation of resources, corporate and social responsibility, relationships, and discrimination. A main focus of this course will be on the ethical and legal standards governing information technology. New technology creates ethical challenges for individuals around the globe...

View details

CYBV385 Introduction to Cyber Operations

CYBV 385 provides students an introduction to the concepts of Confidentiality, Integrity, and Availability (CIA) basics together with authentication and non-repudiation; vulnerabilities; security principles and testing; operating systems; and cryptography. CYBV 385 meets the National Security Agency (NSA) Center of Academic Excellence in Cyber Operations...

View details

CYBV388 Cyber Investigations and Forensics

CYBV 388 provides students with an understanding of intrusion detection methodologies, tools, and approaches to incident response; examination of computer forensic principles, including operating system concepts, registry structures, file system concepts, boot process, low level hardware calls, and file operations; and an exploration of the ethical...

View details

CYBV400 Active Cyber Defense

CYBV 400 will provide students with an introduction to the policies, techniques and operational capabilities and limitations of implementing an Active Cyber Defense program. A broad survey of development of defensible network architectures; integration of passive defensive technologies; consumption and production of Cyber Threat...

View details

CYBV454 Malware Threats & Analysis

CYBV/INFV 454 provides students a methodology to safely perform static and dynamic analysis of software of potentially unknown origin, including obfuscated malware, to fully understand the software's functionality and specifications. Students will use hands- on labs and exercises to examine the fundamental principles of malware analysis and...

View details

CYBV470 C Programming for Security Professionals

CYBV470 provides students with an introduction to C programming. Students will use hands-on labs and exercises to practice and implement applications developed in the C programming language.

CYBV471 Assembly Programming for Security Professionals

CYBV471 will provide students with an introduction to assembly language programming. Students will use hands-on labs and exercises to practice and implement applications developed in the x86-64 Assembly programming language. CYBV471 meets the National Security Agency (NSA) Center of Academic Excellence in Cyber Operations...

View details

CYBV472 Secure Software Development & Assessment

CYBV 472 will provide students with an introduction to the secure software development process as well as how to conduct a software security analysis to safely perform static and dynamic analysis of software of potentially unknown origin, including obfuscated malware, to detect the presence of weaknesses that may lead to exploitable...

View details

CYBV473 Violent Python

CYBV 473 will provide students with advanced practical applications of Python programming to support offensive and defensive cybersecurity operations. A crosscut of Python concepts, tools, and techniques will be presented. Students will use interactive programming activities to master and create advanced Python tools to...

View details

CYBV479 Wireless Networking & Security

CYBV479 provides students an introduction to wireless networking, mobile device hardware and software architectures as well as the application of security fundamentals for mobile computing systems. Students will be able to describe user associations and routing in a cellular/mobile network, interaction of elements within the...

View details

CYBV480 Cyber Warfare

CYBV 480 will provide students with an introduction to cyber warfare along with its policy, doctrine, and operational constraints. A broad survey of cyber tools, techniques and procedures will be presented, and students will use hands-on labs to practice and implement attack methodologies. CYBV 480 meets the National Security Agency (NSA) Center of...

View details

CYBV498 Cyber Operations Senior Capstone

CYBV 498 is designed to provide Cyber Operations majors with a capstone experience emphasizing integration of knowledge acquired in previous courses. The course provides a culminating experience for majors involving a substantive project that demonstrates a synthesis of learning accumulated in the major, including broadly...

View details

ENGV306 Advanced Composition

ENGV306 studies genre and rhetorical situation; advanced practice in expository writing.

INFV320 Computational Thinking & Doing

INFV320 covers basics of programming and techniques used by computing professionals in a variety of application areas. Topics include computation, programs, algorithms, programming languages, complexity, and computability. The course also explores how these concepts and techniques are applied in Informatics...

View details

NETV379 Cloud Computing: Theories and Application

NETV 379 provides students an introduction to the concepts of cloud computing and a clear understanding of the variety, complexity, and capabilities of modern cloud platforms. The student will learn how to deploy web services in a cloud computing environment and how to scale capabilities using orchestration and automation...

View details

 
 

CYBV301 Fundamentals of Cybersecurity

CYBV 301 will provide students with an introduction to the fundamentals of cybersecurity, which will include an introduction to cyber security. A broad survey of cybersecurity concepts, tools, technologies and best practices will be presented. Students will use hands-on activities to become familiar with and practice...

View details

CYBV302 Linux Security Essentials

CYBV302 provides students with an in-depth analysis of Linux and Unix security issues. This includes configuration guidance using industry standards and benchmarks and implementation through practical, real world examples. The course will examine how to mitigate or eliminate general problems that apply to Nix like OSs, including vulnerabilities in...

View details

CYBV303 Windows Security Essentials

provides students with the foundational knowledge of the Windows Operating System and securing Windows environments including; learning PowerShell scripting, host hardening and active directory scripting, smart tokens and Public Key Infrastructure (PKI), protecting admin credentials, and thwarting hackers inside the network. Students will...

View details

CYBV326 Introductory Methods of Network Analysis

CYBV/BASV 326 provides students a methodology for analyzing networks by examining the network at its infrastructure, network and applications layers; exploring how they transfer data; investigating how network protocols work to enable communication; and probing and analyzing how the lower-level network layers support the upper ones...

View details

CYBV329 Cyber Law, Ethics, and Policy

CYBV329 consists of a sustained study of ethical and legal issues that arise in relation to employment in the public and private sectors, including allocation of resources, corporate and social responsibility, relationships, and discrimination. A main focus of this course will be on the ethical and legal standards governing information technology. New technology creates ethical challenges for individuals around the globe...

View details

CYBV354 Principles of Open Source Intelligence (OSINT)

CYBV354 provide students with an overview of the fundamentals of Open Source Intelligence. Students will be presented with the most effective methodologies used by cyber professionals, law enforcement, and other investigative personnel to locate and analyze information on the Internet and Dark Web. Students will use interactive...

View details

CYBV385 Introduction to Cyber Operations

CYBV 385 provides students an introduction to the concepts of Confidentiality, Integrity, and Availability (CIA) basics together with authentication and non-repudiation; vulnerabilities; security principles and testing; operating systems; and cryptography. CYBV 385 meets the National Security Agency (NSA) Center of Academic Excellence in Cyber Operations...

View details

CYBV388 Cyber Investigations and Forensics

CYBV 388 provides students with an understanding of intrusion detection methodologies, tools, and approaches to incident response; examination of computer forensic principles, including operating system concepts, registry structures, file system concepts, boot process, low level hardware calls, and file operations; and an exploration of the ethical...

View details

CYBV400 Active Cyber Defense

CYBV 400 will provide students with an introduction to the policies, techniques and operational capabilities and limitations of implementing an Active Cyber Defense program. A broad survey of development of defensible network architectures; integration of passive defensive technologies; consumption and production of Cyber Threat...

View details

CYBV435 Cyber Threat Intelligence

CYBV435 will provide students with an in-depth investigation of threat actors and the techniques they employ to attack networks. Students will research threat capabilities and objectives. Formal ethical hacking methodology including reconnaissance, scanning and enumeration, gaining access, escalation of privilege, maintaining...

View details

CYBV436 Counter Cyber Threat Intelligence

CYBV 436 will provide students with an in-depth examination of the tactics, techniques and procedures used to conduct online anonymization and attribution. An extensive analysis of the concepts, technologies, and best practices will be presented. Students will use interactive activities to become familiar with and practice the protection...

View details

CYBV454 Malware Threats & Analysis

CYBV/INFV 454 provides students a methodology to safely perform static and dynamic analysis of software of potentially unknown origin, including obfuscated malware, to fully understand the software's functionality and specifications. Students will use hands- on labs and exercises to examine the fundamental principles of malware analysis and...

View details

CYBV473 Violent Python

CYBV 473 will provide students with advanced practical applications of Python programming to support offensive and defensive cybersecurity operations. A crosscut of Python concepts, tools, and techniques will be presented. Students will use interactive programming activities to master and create advanced Python tools to...

View details

CYBV474 Advanced Analytics for Security Operations

CYBV474 provides students an in-depth examination of how the Python scripting language can be used to support advanced analysis in offensive and defensive security operations. Students will use hands-on scripting exercises to evaluate the strengths and weaknesses of automated tools to solve complex security-related problems; practice...

View details

CYBV479 Wireless Networking & Security

CYBV479 provides students an introduction to wireless networking, mobile device hardware and software architectures as well as the application of security fundamentals for mobile computing systems. Students will be able to describe user associations and routing in a cellular/mobile network, interaction of elements within the...

View details

CYBV480 Cyber Warfare

CYBV 480 will provide students with an introduction to cyber warfare along with its policy, doctrine, and operational constraints. A broad survey of cyber tools, techniques and procedures will be presented, and students will use hands-on labs to practice and implement attack methodologies. CYBV 480 meets the National Security Agency (NSA) Center of...

View details

CYBV481 Social Engineering Attacks & Defenses

CYBV 481 will provide students with an advanced analysis of the tactics, techniques, and tools used to conduct and defend against Social Engineering attacks. A survey of why social engineering attacks are among the most effective Cyber-attack mechanisms and what can be done to mitigate them will be presented. Students...

View details

CYBV498 Cyber Operations Senior Capstone

CYBV 498 is designed to provide Cyber Operations majors with a capstone experience emphasizing integration of knowledge acquired in previous courses. The course provides a culminating experience for majors involving a substantive project that demonstrates a synthesis of learning accumulated in the major, including broadly...

View details

ENGV306 Advanced Composition

ENGV306 studies genre and rhetorical situation; advanced practice in expository writing.

INFV320 Computational Thinking & Doing

INFV320 covers basics of programming and techniques used by computing professionals in a variety of application areas. Topics include computation, programs, algorithms, programming languages, complexity, and computability. The course also explores how these concepts and techniques are applied in Informatics...

View details

NETV379 Cloud Computing: Theories and Application

NETV 379 provides students an introduction to the concepts of cloud computing and a clear understanding of the variety, complexity, and capabilities of modern cloud platforms. The student will learn how to deploy web services in a cloud computing environment and how to scale capabilities using orchestration and automation...

View details

NETV477 Advanced Cyber Forensics

NETV/CYBV 477 is an advanced computer forensics course that provides students an in depth knowledge of network forensics, network flow analysis, network intrusion detection systems, event reconstruction and memory forensics for Windows, Linux and MAC operating systems.

View details

 
 

BASV314 Mathematics for Applied Sciences

BASV 314 will examine applications of probability, statistics, data analysis, hypothesis testing, apportionment and scheduling to the applied sciences. Registration requires a passing grade on the UA South BAS Math Readiness test.

CYBV301 Fundamentals of Cybersecurity

CYBV 301 will provide students with an introduction to the fundamentals of cybersecurity, which will include an introduction to cyber security. A broad survey of cybersecurity concepts, tools, technologies and best practices will be presented. Students will use hands-on activities to become familiar with and practice...

View details

CYBV302 Linux Security Essentials

CYBV302 provides students with an in-depth analysis of Linux and Unix security issues. This includes configuration guidance using industry standards and benchmarks and implementation through practical, real world examples. The course will examine how to mitigate or eliminate general problems that apply to Nix like OSs, including vulnerabilities in...

View details

CYBV303 Windows Security Essentials

provides students with the foundational knowledge of the Windows Operating System and securing Windows environments including; learning PowerShell scripting, host hardening and active directory scripting, smart tokens and Public Key Infrastructure (PKI), protecting admin credentials, and thwarting hackers inside the network. Students will...

View details

CYBV326 Introductory Methods of Network Analysis

CYBV/BASV 326 provides students a methodology for analyzing networks by examining the network at its infrastructure, network and applications layers; exploring how they transfer data; investigating how network protocols work to enable communication; and probing and analyzing how the lower-level network layers support the upper ones...

View details

CYBV329 Cyber Law, Ethics, and Policy

CYBV329 consists of a sustained study of ethical and legal issues that arise in relation to employment in the public and private sectors, including allocation of resources, corporate and social responsibility, relationships, and discrimination. A main focus of this course will be on the ethical and legal standards governing information technology. New technology creates ethical challenges for individuals around the globe...

View details

CYBV385 Introduction to Cyber Operations

CYBV 385 provides students an introduction to the concepts of Confidentiality, Integrity, and Availability (CIA) basics together with authentication and non-repudiation; vulnerabilities; security principles and testing; operating systems; and cryptography. CYBV 385 meets the National Security Agency (NSA) Center of Academic Excellence in Cyber Operations...

View details

CYBV400 Active Cyber Defense

CYBV 400 will provide students with an introduction to the policies, techniques and operational capabilities and limitations of implementing an Active Cyber Defense program. A broad survey of development of defensible network architectures; integration of passive defensive technologies; consumption and production of Cyber Threat...

View details

CYBV435 Cyber Threat Intelligence

CYBV435 will provide students with an in-depth investigation of threat actors and the techniques they employ to attack networks. Students will research threat capabilities and objectives. Formal ethical hacking methodology including reconnaissance, scanning and enumeration, gaining access, escalation of privilege, maintaining...

View details

CYBV436 Counter Cyber Threat Intelligence

CYBV 436 will provide students with an in-depth examination of the tactics, techniques and procedures used to conduct online anonymization and attribution. An extensive analysis of the concepts, technologies, and best practices will be presented. Students will use interactive activities to become familiar with and practice the protection...

View details

CYBV440 Digital Espionage

CYBV440 will provide students with a comprehensive overview of the concepts, tactics, techniques adversaries use to steal secrets for political or economic reasons. Students will analyze case studies to become familiar with how to detect, identify, and mitigate digital espionage operations and the actors who conduct them.

View details

CYBV441 Cyber War, Terror & Crime

CYBV441 prepares students to perform analyses of major cyber events to determine contextual relevance and possible threat actor intentions. Using case studies, students will conduct an analytic examination of the similarities and differences among discrete cyber events to determine whether an event presents as possible criminal activity, terrorist activity, or rises to the level of an act of war.

View details

CYBV473 Violent Python

CYBV 473 will provide students with advanced practical applications of Python programming to support offensive and defensive cybersecurity operations. A crosscut of Python concepts, tools, and techniques will be presented. Students will use interactive programming activities to master and create advanced Python tools to...

View details

CYBV498 Cyber Operations Senior Capstone

CYBV 498 is designed to provide Cyber Operations majors with a capstone experience emphasizing integration of knowledge acquired in previous courses. The course provides a culminating experience for majors involving a substantive project that demonstrates a synthesis of learning accumulated in the major, including broadly...

View details

ENGV306 Advanced Composition

ENGV306 studies genre and rhetorical situation; advanced practice in expository writing.

GPSV442 International Law

GPSV442 studies the international state system; legal-political problems, including territory, environment, seas.

INTV461 Civil Liberties & the US Constitution

INTV461 analyzes the constitutional guarantees of civil liberties in the U.S. Constitution

INFV320 Computational Thinking & Doing

INFV320 covers basics of programming and techniques used by computing professionals in a variety of application areas. Topics include computation, programs, algorithms, programming languages, complexity, and computability. The course also explores how these concepts and techniques are applied in Informatics...

View details

Cyberapolis

Curriculum