Advanced Studies in Cyber Operations: Online Certificate Curriculum

Curriculum Details

18 TOTAL
CREDITS REQUIRED

Through six courses, you'll explore the intricacies of computer network operations. You will also learn the tactics, techniques, and procedures used to navigate cyber issues; examine data hiding tools and investigation; and dissect cybersecurity methods for attacking, defending, and exploiting networks, so you can understand your adversary.

When you're ready, you may seamlessly transition into one of three graduate programs: the Master's in Cybersecurity, the Master’s in Cybersecurity: Cyber Policy Specialization, and Master of Business Administration (MBA). Note, not all credit hours may transfer into the Master's degree. Permission of the Program Director is required.

The curriculum course abstracts on this page are meant to provide a high-level course overview and subject to change based on term, faculty, and/or institutional requirements. View the official course descriptions as written in the Utica College Academic Catalog and in adherence to regional compliance.

Required Courses

Credit Hours

Major Course Requirements Total Hours:

CYB 640 Tactics, Techniques, and ProceduresCredit Hours: 3

Explore the ethical, technical, and legal fundamentals associated with cyber operations.

Prerequisites: CYB 605, CYB 610, CYB 633, and CYB 673 or permission of instructor

CYB 641 Computer and Network OperationsCredit Hours: 3

Perform studies of attack and defense methods in the cyber environment and learn about the intricacies of vulnerability assessment, penetration testing, and system exploitation.

Prerequisites: CYB 605, CYB 610, CYB 633 and CYB 673, or permission of instructor

CYB 642 Access Methods and Data HidingCredit Hours: 3

Explore data hiding, including methods of anonymity, steganography, cryptography, and anti-forensics.

Prerequisite: CYB 605, CYB 610, CYB 633, and CYB 673, or permission of instructor

CYB 643 Autonomous Cyber OperationsCredit Hours: 3

Learn the construction, discovery, and analysis of defensive and offensive viral code. You'll also examine the legal issues associated with autonomous operations.

Prerequisites: CYB 605, 610, 633, and 673 or permission of instructor

CYB 649 Advanced Topics in Cyber OperationsCredit Hours: 3

Apply cyber operations techniques to realistic, systems-oriented problem sets in an integrated defensive/offensive scenario-based virtual environment. This course will also address cyber incident response.

Prerequisites: CYB 605, CYB 610, CYB 633, and CYB 673, or permission of instructor

CYB 653 Network ForensicsCredit Hours: 3

Gain an introduction to identifying data of evidentiary value within network communications.

 
Request More Information

We'd love to get to know you and hear more about your educational and professional goals. If you'd like to learn more about one of our programs, fill out this form and we'll be in touch:

          I consent to receiving SMS/MMS messages generated by an autodialer from Utica College or its representatives at the mobile number I provided. Consent is not required to receive information. Message & data rates may apply. Send STOP to 35254 to unsubscribe. Send HELP to 35254 for help. Click here for Terms & Conditions and Privacy Policy
          Yes! I'd like to schedule an appointment with an admissions counselor.If this option is not selected, an admission specialist will still contact you at a time of their choosing.
          CAPTCHA
          This question is for testing whether or not you are a human visitor and to prevent automated spam submissions.