You are here

Cyber Operations

UA South Logo

Return to the UA South Assessment page


The BAS in Cyber Operations is designed specifically to prepare graduates for entry into a number of cyber-related occupations in defense, law enforcement, and private industry. The curriculum will provide students with a critical baseline of technology skills, as well as critical thinking skills and detective-like thought processes that enable students to analyze problems and render solutions. Students will apply knowledge of human and organizational behavior to predict vulnerabilities created by human error; understand and know how to apply legal and ethical standards to the world of cyber, and be able to communicate effectively.

Expected Learning Outcomes: 

A student who completes the Bachelor of Applied Sciences in Cyber Operations will:

·         demonstrate understanding of the technologies and methods utilized to defend systems and networks.

·         describe, evaluate, and operate a defensive network architecture employing multiple layers of protection using technologies appropriate to meet mission security goals.

·         demonstrate proficiency in low-level programming languages in order to construct programs in the cyber operations field (e.g., forensics, malware analysis, exploit development).

·         describe and demonstrate understanding of operating systems theory and implementation.

·         demonstrate a thorough understanding of how networks work at the infrastructure, network and applications layers; how they transfer data; how network protocols work to enable communication; and how the lower-level network layers support the upper ones.

·         demonstrate understanding of how variability affects outcomes, how to identify anomalous events, and how to integrate and differentiate continuous functions of multiple variables.

·         identify the various types of vulnerabilities (design and/or implementation weaknesses), their underlying causes, their identifying characteristics, the ways in which they are exploited, and potential mitigation strategies.

·         apply fundamental security design principles during system design, development and implementation to minimize vulnerabilities.

·         identify and apply the legal and ethical imperatives governing the authorized conduct of cyber operations and the use of related tools, techniques, technology and data.

·         identify and analyze user associations and routing in a cellular/mobile network, interaction of elements within the cellular/mobile core, and end-to-end delivery of a packet and/or signal and what happens with the hand-off at each step along the communications path.

Assessment Activities: 

·         Demonstration of application of theory and principles and learning outcomes within Concentration in graded Senior Capstone requirement.


The program is going through NSA review at this time. Assessment activities beyond what is listed are under review.

Updated date: Mon, 07/02/2018 - 17:07