At The University of Arizona, earn your degree and learn the concepts and processes that prepare you for a Cyber Security profession that isn't at risk of slowing down.
At The University of Arizona, earn your degree and learn the concepts and processes that prepare you for a Cyber Security profession that isn't at risk of slowing down.
Our Cyber Operations curriculum offers a current and relevant set of learning objectives that immediately prepares you for one of the highest demand sectors of the job market. Rather than train you to a specific sequence of events, we provide a dynamic environment conducive to learning methodologies.
The program is unique from other cybersecurity educational offerings in that we have a robust virtual environment substantial enough to grow and exist far beyond what pertains directly to the learning objectives. There are over 15,000 user personas with ever growing relationships. This makes the learning environment real and flexible; we can shift content to accommodate academic goals that reflect the current real world.
Millions of cyber attacks happen every day — you can help fight back. Apply Now
Obtain hands on experience by hacking in a real world virtual environment. We've created a state-of-the-art learning sandbox: Hack over 15,000 user personas, modern hardware devices, business websites, government utilities, and social networks.
Hack our virtual environment
Access multiple workstations, operating systems, cyber specific tools, and everything you'll need to be successful in the program.
Network Operations Center
Student Portal
Faculty Portal
We have four labs to support the coursework: Malware, Internet of Things (IoT), Forensics, and one for a Capture the Flag for testing skills against fellow students.
Malware
Internet of things (IoT)
Forensics
Capture the flag
Start your future in cyber operations, courses start every 2 months. Contact us for more information about the program.
This Cyber Operations curriculum is NSA pending certified, hands-on cyber activities in a controlled environment with a strong academic educational experience that improves communication and critical thinking skills. All classes are fully online and start every 2 months.
CYBV/BASV 326 provides students a methodology for analyzing networks by examining the network at its infrastructure, network and applications layers; exploring how they transfer data; investigating how network protocols work to enable communication; and probing and analyzing how the lower-level network layers support the upper ones.
CYBV/BASV 329 consists of a sustained study of ethical issues that arise in relation to employment in the public and private sectors, including allocation of resources, corporate and social responsibility, relationships, and discrimination.
CYBV 385 provides students an introduction to the concepts of cyber operations, applying fundamentals of Cyber operations to understanding cyber attack and defense concepts.
Provides students with an understanding of intrusion detection methodologies, tools, and approaches to incident response; an examination of computer forensic principles.
CYBV 389 will provide students with an introduction to cyber warfare along with its policy, doctrine, and operational constraints.
CYBV 400 will provide students with an introduction to the policies, techniques and operational capabilities and limitations of implementing an Active Cyber Defense program.
NETV 435 leads students in an investigation of threat actors and the techniques they employ to attack networks.
CYBV/INFV 454 provides students a methodology to safely perform static and dynamic analysis of software of potentially unknown origin, including obfuscated malware, to fully understand the software's functionality and specifications.
INFV 470 provides students with an introduction to C programming. Students will use hands-on labs and exercises to practice and implement applications developed in the C programming language.
CYBV/INFV 471 will provide students with an introduction to assembly language programming.
CYBV 472 will provide students with an introduction to the secure software development process as well as how to conduct a software security analysis to detect the presence of weaknesses that may lead to exploitable vulnerabilities in operational systems.
CYBV/NETV 479 provides students an introduction to wireless networking, mobile device hardware and software architectures as well as the application of security fundamentals for mobile computing systems.
CYBV 480 will provide students with an introduction to cyber warfare along with its policy, doctrine, and operational constraints.
This course is a beginning level exploration of human-computer design, interaction and interfaces.
The theory and application of cloud computing, including Cloud Computing network design and connectivity, server management, best-practices, security, and provider service level agreements.
The objective of our MIS 416 / 516 course is to provide students with a thorough and operational knowledge of information security so that this critical area is recognized as a management issue and not an I.T. issue.
Computer architecture is the science and art of selecting and interconnecting hardware components to create a computer that meets functional, performance and cost goals.
This course is an introduction to microcontroller organization, hardware interfacing, and system design.
This course aims to provide a strong foundation for students to understand modern computer system architecture and to apply these insights and principles to future computer designs.
Programming in C, including single and multi-dimensional arrays, lists, stacks, queues, trees, and bit manipulation. Unix topics, including debuggers, makefiles, shell programming, and other topics that support C programming.
Learn number systems and coding, logic design, sequential systems, register transfer language.
Introduction to cryptosystems and cryptanalysis.
This course studies the principles and concepts that govern the design of modern computer operating systems.
BASV/RNCV 376 provides students an introduction to algorithm analysis, cryptographic methods, entropy, finite automaton and the discrete mathematics underlying these techniques.
We welcome you to join a profession that helps to prevent identity theft, keep life savings with rightful owners, and in general secures the ignorant. Cyber Academic programs are unique, and of those that exist, The Univerisity of Arizona stands above the rest due to the virtual environment and its contents. We have done more to make our environment mirror reality, and continue doing so to keep current and flexible. Our program is relevant to the real world.
Speak with admissions today about your future in cyber operations
Call: (520) 626-2422 ext. 2120
Email: sasteam@email.arizona.edu