Search

Chat With Us

    Cyber Operations: Cyber Engineering Emphasis
    Go to University of Arizona
    University of Arizona

    Cyber Operations: Cyber Engineering Emphasis

    University of Arizona
    University RankQS Ranking
    287

    Key Facts

    Program Level

    Bachelor

    Study Type

    Full Time

    Delivery

    On Campus

    Application Fee

    USD 85 

    Campuses

    Yuma

    Pima Community College East

    Sierra Vista

    Chandler

    Online - Arizona International Direct

    Online - Arizona Online

    Program Language

    English

    Start & Deadlines

    Next Intake Deadlines21-Aug-2023
    Apply to this program

    Go to the official application for the university

    Duration 4 year(s)
    Tuition Fee
    USD 58,523  / year
    Next Intake 21-Aug-2023

    Cyber Operations: Cyber Engineering Emphasis

    About

    For an exciting career in cybersecurity, study in a program that the National Security Agency has designated a Center of Academic Excellence in Cyber Operations. Students seeking their Bachelor of Applied Science with an emphasis in Cyber Operations through the College of Applied Science and Technology select one of two degree tracks. The Engineering track is a security-focused computer science program. The Defense and Forensics track is a cyber-education program. Both tracks are available in person or fully online. A state-of-the-art virtual learning environment (VLE) called Cyberapolis provides students from both tracks with a virtual city complete with businesses and residents. The VLE allows Cyber Operations majors to attack and counterattack systems to learn about cyber vulnerabilities and how they can be exploited and defended. Graduates land cybersecurity roles in both public and private sectors.
  • Critical Thinking & Problem Solving; Demonstrate understanding of how variability affects outcomes; how to identify anomalous events; how to integrate and differentiate continuous functions of multiple variables; and how to solve complex problems using computation and scripting languages.
  • Cyber Threat Intelligence; Describe and demonstrate how knowledge about an adversary's motivation, intentions, and methods are collected, analyzed, and disseminated to help security personnel and business staff to align resources and protect critical assets within an enterprise architecture.
  • Defensive Cyber Operations; Describe, evaluate, and operate a defensive network architecture employing multiple layers of protection using technologies appropriate to meet mission security goals.
  • Forensics; Demonstrate and explain how to acquire a forensically sound image; understand user activity; determine the manner in which an operating system or application has been subverted; identify forensic artifacts left by attacks; and recover deleted and/or intentionally hidden information.
  • Law, Ethics, & Policy; Describe and explain the relationship between cyber ethics and law; criminal penalties related to unethical hacking; and apply the notion of Gray Areas to articulate where the law has not yet caught up to technology innovation.
  • Malware Reverse Engineering; Safely perform static and dynamic analysis of unknown software, including obfuscated malware, to fully understand the software's functionality.
  • Networking; Demonstrate a thorough understanding of how networks work at the infrastructure, network and applications layers; how they transfer data; how network protocols work to enable communication; and Networkinghow the lower-level network layers support the upper ones.
  • Offensive Cyber Operations; Explain and demonstrate the phases of offensive cyber operations; what each phase entails; who has the authorities to conduct each phase; and how operations are assessed after completion.
  • Operating Systems & Low Level Programming; Demonstrate a thorough understanding of various operating systems and be able to develop low level applications with the required complexity and sophistication to implement exploits for discovered vulnerabilities.
  • Security Principles & Vulnerabilities; Demonstrate and explain the various types of vulnerabilities and their underlying causes; how security principles interrelate and are typically employee to achieve assured solutions; and explain how failures in fundamental security design principles can lead to system vulnerabilities that can be exploited as part of an offensive cyber operation.
  • Disciplines

    College of Applied Science and Technology

    Requirements

    Entry Requirements

    The specific admission requirements relating to Jordan are as follows:

    Required Documentation: High School Transcripts

    Minimum Overall Grade Required: 80 or B equivalent

    Required Certification (if completed secondary/high school): 4 year bachelor

    Undergraduate English Language Proficiency Required: Yes

    Graduate English Language Proficiency Required: Yes

    Career

  • Government agencies
  • Military
  • Defense
  • Law enforcement
  • Consulting
  • Fee Information

    Tuition Fee

    USD 58,523  / year

    Application Fee

    USD 85 

    How to Apply

    • The online application takes 30-45 minutes to complete.
    • Within two days of submitting your application, you’ll receive an email with instructions on how to check your application status online using the Future Wildcat portal.
    • At least once a week be sure to check the email account you used to apply for updates about your admission status, which may require you to take some action.
    • Once your application is complete, you’ll typically be notified of your admission decision within 2 weeks.
    • Admission decisions are announced by email; your admission packet will come in the mail later.
    • Be sure to check your email regularly after you’ve been admitted, so you can take the next steps for enrollment.
    University of Arizona

    Cyber Operations: Cyber Engineering Emphasis

    University of Arizona

    [object Object]

    United States of America,

    Tucson

    Similar Programs

    Other interesting programs for you

    Find More Programs
    Wishlist