Through six courses, you'll explore the intricacies of computer network operations. You will also learn the tactics, techniques, and procedures used to navigate cyber issues; examine data hiding tools and investigation; and dissect cybersecurity methods for attacking, defending, and exploiting networks, so you can understand your adversary.
When you're ready, you may seamlessly transition into one of three graduate programs: the Master's in Cybersecurity, the Master's in Cyber Policy and Risk Analysis, and Master of Business Administration (MBA). Note, not all credit hours may transfer into the Master's degree. Permission of the Program Director is required.
The curriculum course abstracts on this page are meant to provide a high-level course overview and subject to change based on term, faculty, and/or institutional requirements. View the official course descriptions as written in the Utica College Academic Catalog and in adherence to regional compliance.