CYBRBAPS - Cyber Operations

Download as PDF

Applied Sci & Tech, Col of College of Applied Sci & Tech BAPS - Bachelor of Applied Science

Program Type

Bachelor of Applied Science

College

College of Applied Science & Technology

Career

Undergraduate

Program Description

The Bachelor of Applied Science in Cyber Operations, designated by the National Security Agency as a Center of Academic Excellence in Cyber Operations (CAE-CO), prepares graduates for cyber-related occupations in defense, law enforcement, and private industry. The curriculum includes both offensive and defensive cyber security content delivered within our state-of-the-art Cyber Virtual Learning Environment to ensure our students have extensive hands-on experiences to develop the knowledge, skills, and abilities necessary to succeed after they graduate. The BAS degree in Cyber Operations offers the choice from three emphases, either in-person and fully online. The Cyber Engineering emphasis is a deeply technical, interdisciplinary, security focused Computer Science program. The Cyber Engineering emphasis meets the National Security Agency (NSA) Center of Academic Excellence in Cyber Operations (CAE-CO) academic requirements. The Defense & Forensics emphasis is an interdisciplinary Cyber education program. The Defense & Forensics emphasis conforms to academic requirements from both the National Security Agency's Centers of Academic Excellence in Cyber Operations (CAE-CO) and Cyber Defense (CAE-CD). The Cyber Law & Policy emphasis is a unique program that combines highly technical, hands-on cyber curriculum with a strong foundation in national and international law, strategy, and policy relevant to cyber professionals. The technical cyber courses conform to the academic requirements from both the National Security Agency's Centers of Academic Excellence in Cyber Operations (CAE-CO) and Cyber Defense (CAE-CD).

Learning Outcomes

LEARNING OUTCOMES
- Critical Thinking & Problem Solving; Demonstrate understanding of how variability affects outcomes; how to identify anomalous events; how to integrate and differentiate continuous functions of multiple variables; and how to solve complex problems using computation and scripting languages.
- Cyber Threat Intelligence; Describe and demonstrate how knowledge about an adversary's motivation, intentions, and methods are collected, analyzed, and disseminated to help security personnel and business staff to align resources and protect critical assets within an enterprise architecture.
- Defensive Cyber Operations; Describe, evaluate, and operate a defensive network architecture employing multiple layers of protection using technologies appropriate to meet mission security goals.
- Forensics; Demonstrate and explain how to acquire a forensically sound image; understand user activity; determine the manner in which an operating system or application has been subverted; identify forensic artifacts left by attacks; and recover deleted and/or intentionally hidden information.
- Law, Ethics, & Policy; Describe and explain the relationship between cyber ethics and law; criminal penalties related to unethical hacking; and apply the notion of Gray Areas to articulate where the law has not yet caught up to technology innovation.
- Malware Reverse Engineering; Safely perform static and dynamic analysis of unknown software, including obfuscated malware, to fully understand the software's functionality.
- Networking; Demonstrate a thorough understanding of how networks work at the infrastructure, network and applications layers; how they transfer data; how network protocols work to enable communication; and Networkinghow the lower-level network layers support the upper ones.
- Offensive Cyber Operations; Explain and demonstrate the phases of offensive cyber operations; what each phase entails; who has the authorities to conduct each phase; and how operations are assessed after completion.
- Operating Systems & Low Level Programming; Demonstrate a thorough understanding of various operating systems and be able to develop low level applications with the required complexity and sophistication to implement exploits for discovered vulnerabilities.
- Security Principles & Vulnerabilities; Demonstrate and explain the various types of vulnerabilities and their underlying causes; how security principles interrelate and are typically employee to achieve assured solutions; and explain how failures in fundamental security design principles can lead to system vulnerabilities that can be exploited as part of an offensive cyber operation.