The certificate in Cyber Operations provides students with an understanding of the tools and techniques used to actively protect cyberspace systems and networks. Students taking this certificate program learn about state-of-the-art tools and techniques in both cyber defense and cyber-attack domains. Students will apply the latest tools and technologies in hands-on, controlled experimental environments. In addition, students will examine how data-hiding methods such as steganography and anonymity are used in the conduct of cyberspace operations. Students also learn about how to identify and mitigate adversarial cyber intrusions and attacks.
Utica College is proud to be designated a National Center of Academic Excellence in Cyber Defense Education (CAE CD) by the National Security Agency (NSA) and Department of Homeland Security (DHS). The college has also earned a National Center of Digital Forensics Academic Excellence (CDFAE) by the Defense Cyber Crime Center (DC3), as well as designation as an Academic Center of Excellence (ACE) by the EC-Council. The advanced Cyber Operations certificate helps prepare students for the Certified Ethical Hacker (CEH) exam.
Courses & Curriculum
Students will learn the fundamentals and current issues in the dynamic and growing field of cyber ops in the following courses:
CYB 640 – Tactics, Techniques and Procedures
This course presents the foundational Tactics, Techniques and Procedures (TTPs) for Cyber Technical, Legal and Ethical issues. You’ll develop an understanding of the evolution of Cyber TTPs and their application on current events. Additionally, you’ll explore the development of Computer Network Operations by looking at the Strategic and National view.
CYB 641 – Computer and Network Operations
Gain an understanding of the foundational concepts and processes of computer network operations. You’ll develop an appreciation and depth of understanding in computer network operations (CNO) through course topics, covering the three pillars of computer network operations to include attack, defense and exploitation. Discover system vulnerability assessment to gain an appreciation for each of the pillars of CNO.
CYB 642 – Access Methods and Data Hiding
This course takes an in-depth look at data hiding methods, techniques and access methods, from both a historical perspective and an up-to-the-minute review of the latest developments. The course also includes both research and practical experimentation of data hiding tools, investigation techniques and the latest countermeasures.
CYB 643 – Autonomous Cyber Operations
Understand construction, discovery and analysis of viral code from both a defensive and offensive standpoint. Address legal issues associated with autonomous operations, and examine the design, construction, engineering and reverse engineering of computer code in an effort to better understand the cutting edge technology used by both malicious hackers and nation state engineering teams for cyber weapon development.
CYB 649 – Advanced Topics in Cyber Operations
Gain an understanding of advanced concepts and techniques of computer network operations. Develop the skills and techniques used in computer network operations (CNO), and get a hands-on approach to the three pillars of computer network operations to include attack, defense and exploitation.
CYB 653 – Network Forensics
This course provides students with an understanding of the technology, laws, regulations, ethics and procedures for network forensics. The course provides an introduction to identifying data of evidentiary value, and collecting and analyzing digital evidence within computer networks. Emphasis will be placed upon the technical aspects of the problem.
Total Required Credits Hours: 18
To apply for admission, you must meet the following requirements:
- :: Bachelor's degree or International equivalent
- :: Minimum GPA of 2.7. Applicants with GPAs below 2.7 can be admitted at the discretion of the department
- :: No GRE or GMAT exam required
View gainful employment disclosures for Certificates.
Cyber Operations Learning Goals
- :: Analyze and assess tactics, techniques and procedures for cyberspace operations in the context of legal and ethical issues and constraints
- :: Apply vulnerability assessment and penetration testing tools to assess the security posture of cyberspace systems
- :: Conduct cyber defense and cyber attack experiments
- :: Apply data hiding methods to cyberspace operations
- :: Apply network forensic tools and techniques to diagnose system problems and cyber incidents.
Continue Your Education
When you’re ready to advance your education, you may seamlessly transfer your Certificate of Advanced Studies credits to complete either of these Master's degrees in as few as 12 months.1 Not all credit hours may transfer into the Master’s degree. Permission of the Program Director is required.
Additional Certificates of Advanced Study can be found here.
Want to Learn More?
Request More Information or call us today at 315.732.2640 or toll-free at 866.295.3106 to speak with a Program Manager.
¹Students are expected to take 1 class every 8 weeks. Please contact your Program Manager for detailed guidelines.