At The University of Arizona, earn your degree and learn the concepts and processes that prepare you for a Cyber Security profession that isn't at risk of slowing down.

Our Cyber Operations curriculum offers a current and relevant set of learning objectives that immediately prepares you for one of the highest demand sectors of the job market. Rather than train you to a specific sequence of events, we provide a dynamic environment conducive to learning methodologies.

The program is unique from other cybersecurity educational offerings in that we have a robust virtual environment substantial enough to grow and exist far beyond what pertains directly to the learning objectives. There are over 15,000 user personas with ever growing relationships. This makes the learning environment real and flexible; we can shift content to accommodate academic goals that reflect the current real world.

Learn more about our cyber operations program by contacting us today.

University of Arizona Logo APPLY NOW




We teach you the current principles and methodologies used by both white and black hats so that you have a foundation to build upon

There is no greater demand

Millions of cyber attacks happen every day — you can help fight back. Apply Now


Obtain hands on experience by hacking in a real world virtual environment. We've created a state-of-the-art learning sandbox: Hack over 15,000 user personas, modern hardware devices, business websites, government utilities, and social networks.

Virtual environment - Water HMI website
Virtual environment - Micro blog services
Virtual environment - Water company public website
Virtual environment - Private banking member website

Hack our virtual environment


Access multiple workstations, operating systems, cyber specific tools, and everything you'll need to be successful in the program.

Network Operations Center

Student Portal

Faculty Portal


We have four labs to support the coursework: Malware, Internet of Things (IoT), Forensics, and one for a Capture the Flag for testing skills against fellow students.


Internet of things (IoT)


Capture the flag

Start your future in cyber operations, courses start every 2 months. Contact us for more information about the program.


Cyber security computer lab


NSA Seal
Fully online

This Cyber Operations curriculum is NSA pending certified, hands-on cyber activities in a controlled environment with a strong academic educational experience that improves communication and critical thinking skills. All classes are fully online and start every 2 months.

CYBV 326—Network Analysis

CYBV/BASV 326 provides students a methodology for analyzing networks by examining the network at its infrastructure, network and applications layers; exploring how they transfer data; investigating how network protocols work to enable communication; and probing and analyzing how the lower-level network layers support the upper ones.

View details

CYBV 329—Cyber Ethics

CYBV/BASV 329 consists of a sustained study of ethical issues that arise in relation to employment in the public and private sectors, including allocation of resources, corporate and social responsibility, relationships, and discrimination.

View details

CYBV 385—Intro to Cyber Operations

CYBV 385 provides students an introduction to the concepts of cyber operations, applying fundamentals of Cyber operations to understanding cyber attack and defense concepts.

View details

CYBV/NETV 388—Cyber Investigations and Forensics

Provides students with an understanding of intrusion detection methodologies, tools, and approaches to incident response; an examination of computer forensic principles.

View details

CYBV 389—OS Theory

CYBV 389 will provide students with an introduction to cyber warfare along with its policy, doctrine, and operational constraints.

View details

CYBV 400—Active Cyber Defense

CYBV 400 will provide students with an introduction to the policies, techniques and operational capabilities and limitations of implementing an Active Cyber Defense program.

View details

CYBV/NETV 435—Cyber Threat Intelligence

NETV 435 leads students in an investigation of threat actors and the techniques they employ to attack networks.

View details

CYBV/INFV 454—Malware Threats & Analysis

CYBV/INFV 454 provides students a methodology to safely perform static and dynamic analysis of software of potentially unknown origin, including obfuscated malware, to fully understand the software's functionality and specifications.

View details

INFV 470—C Programming for Security Professionals

INFV 470 provides students with an introduction to C programming. Students will use hands-on labs and exercises to practice and implement applications developed in the C programming language.

View details

CYBV/INFV 471—Assembly Programming for Security Professionals

CYBV/INFV 471 will provide students with an introduction to assembly language programming.

View details

CYBV/INFV 472—Secure Software Development & Assessment

CYBV 472 will provide students with an introduction to the secure software development process as well as how to conduct a software security analysis to detect the presence of weaknesses that may lead to exploitable vulnerabilities in operational systems.

View details

CYBV/NETV 479—Wireless Networking & Security

CYBV/NETV 479 provides students an introduction to wireless networking, mobile device hardware and software architectures as well as the application of security fundamentals for mobile computing systems.

View details

CYBV 480—Cyber Warfare

CYBV 480 will provide students with an introduction to cyber warfare along with its policy, doctrine, and operational constraints.

View details

ETCV/INFV 401—Introduction to Human-Computer Interaction

This course is a beginning level exploration of human-computer design, interaction and interfaces.

View details

INFV/NETV 379—Cloud Computing: Theories and Application

The theory and application of cloud computing, including Cloud Computing network design and connectivity, server management, best-practices, security, and provider service level agreements.

View details

MIS 416—Information Security Risk Management

The objective of our MIS 416 / 516 course is to provide students with a thorough and operational knowledge of information security so that this critical area is recognized as a management issue and not an I.T. issue.

View details

ECE 369A—Fundamentals of Computer Organization

Computer architecture is the science and art of selecting and interconnecting hardware components to create a computer that meets functional, performance and cost goals.

View details

ECE 372A—Microprocessor Organization

This course is an introduction to microcontroller organization, hardware interfacing, and system design.

View details

ECE 462—Computer Architecture and Design

This course aims to provide a strong foundation for students to understand modern computer system architecture and to apply these insights and principles to future computer designs.

View details

CSCV 352—Systems Programming and Unix

Programming in C, including single and multi-dimensional arrays, lists, stacks, queues, trees, and bit manipulation. Unix topics, including debuggers, makefiles, shell programming, and other topics that support C programming.

View details

ECE 274A—Digital Logic

Learn number systems and coding, logic design, sequential systems, register transfer language.

View details

MATH 445—Introduction to Crypotography

Introduction to cryptosystems and cryptanalysis.

View details

CSCV 452—Operating Systems

This course studies the principles and concepts that govern the design of modern computer operating systems.

View details

BASV/RNCV 376—Mathematics for Applied Technology

BASV/RNCV 376 provides students an introduction to algorithm analysis, cryptographic methods, entropy, finite automaton and the discrete mathematics underlying these techniques.

View details

Military Credit

Transfer Evaluation

Financial Assistance


We welcome you to join a profession that helps to prevent identity theft, keep life savings with rightful owners, and in general secures the ignorant. Cyber Academic programs are unique, and of those that exist, The Univerisity of Arizona stands above the rest due to the virtual environment and its contents. We have done more to make our environment mirror reality, and continue doing so to keep current and flexible. Our program is relevant to the real world.

University of Arizona Logo APPLY NOW

Speak with admissions today about your future in cyber operations

Contact Us

Call: (520) 626-2422 ext. 2120


Computer with Cyber Operations Course Virtual Environment