ENG

Cyber Engineering

Bachelor of Applied Science

Coursework Location(s)

Chandler
Douglas
Online - Arizona Online
Online - Global Direct
Pima Community College East
Sierra Vista
Yuma

Areas of Interest
  • Business, Economics & Entrepreneurship
  • Computer & Information Science
  • Law, Policy & Social Justice
  • Mathematics, Statistics & Data Science
  • Engineering & Technology
  • Communication, Journalism & Public Relations
  • Interdisciplinary Studies
For an exciting career in cybersecurity, study in a program that the National Security Agency has designated a Center of Academic Excellence in Cyber Operations. Students seeking their Bachelor of Applied Science with an emphasis in Cyber Operations through the College of Applied Science and Technology select one of two degree tracks. The Engineering track is a security-focused computer science program. The Defense and Forensics track is a cyber-education program. Both tracks are available in person or fully online. A state-of-the-art virtual learning environment (VLE) called Cyberapolis provides students from both tracks with a virtual city complete with businesses and residents. The VLE allows Cyber Operations majors to attack and counterattack systems to learn about cyber vulnerabilities and how they can be exploited and defended. Graduates land cybersecurity roles in both public and private sectors.
Learning Outcomes
Critical Thinking & Problem Solving; Demonstrate understanding of how variability affects outcomes; how to identify anomalous events; how to integrate and differentiate continuous functions of multiple variables; and how to solve complex problems using computation and scripting languages. Cyber Threat Intelligence; Describe and demonstrate how knowledge about an adversary's motivation, intentions, and methods are collected, analyzed, and disseminated to help security personnel and business staff to align resources and protect critical assets within an enterprise architecture. Defensive Cyber Operations; Describe, evaluate, and operate a defensive network architecture employing multiple layers of protection using technologies appropriate to meet mission security goals. Forensics; Demonstrate and explain how to acquire a forensically sound image; understand user activity; determine the manner in which an operating system or application has been subverted; identify forensic artifacts left by attacks; and recover deleted and/or intentionally hidden information. Law, Ethics, & Policy; Describe and explain the relationship between cyber ethics and law; criminal penalties related to unethical hacking; and apply the notion of Gray Areas to articulate where the law has not yet caught up to technology innovation. Malware Reverse Engineering; Safely perform static and dynamic analysis of unknown software, including obfuscated malware, to fully understand the software's functionality. Networking; Demonstrate a thorough understanding of how networks work at the infrastructure, network and applications layers; how they transfer data; how network protocols work to enable communication; and Networkinghow the lower-level network layers support the upper ones. Offensive Cyber Operations; Explain and demonstrate the phases of offensive cyber operations; what each phase entails; who has the authorities to conduct each phase; and how operations are assessed after completion. Operating Systems & Low Level Programming; Demonstrate a thorough understanding of various operating systems and be able to develop low level applications with the required complexity and sophistication to implement exploits for discovered vulnerabilities. Security Principles & Vulnerabilities; Demonstrate and explain the various types of vulnerabilities and their underlying causes; how security principles interrelate and are typically employee to achieve assured solutions; and explain how failures in fundamental security design principles can lead to system vulnerabilities that can be exploited as part of an offensive cyber operation.
Sample Courses
  • CYBV 454: Malware Threats and Analysis
  • CYBV 472: Secure Software Development and Analysis
  • CYBV 480: Cyber Warfare
Career Fields
  • Government agencies
  • Military
  • Defense
  • Law enforcement
  • Consulting
Level of Math
General Knowledge
LEVEL OF SECOND LANGUAGE
2nd Semester Proficiency
Pre-major Required?
NO
Sample Plans 2020 - Cyber Engineering

First Year

1st Semester
Credits
Recommended AAS Pathway
0.00
ENGL 101
3.00
1st Semester Second Language
4.00
AAS Required Course
3.00
AAS Required Course
3.00
AAS Required Math
3.00
2nd Semester
Credits
ENGL 102
3.00
AAS Required Course
3.00
2nd Semester Second Language
4.00
Intro to C programming
3.00

Second Year

3rd Semester
Credits
Intro to Assembly Programming
3.00
BASV 300 or Math 243
3.00
AAS Required Course
3.00
AAS Required Course
3.00
AAS Required Course or elective
2.00
4th Semester
Credits
AAS Required Course
3.00
AAS Required Course
3.00
AAS Required Course or elective
2.00
AAS Required Course
3.00
Tier II General Education
3.00

Third Year

5th Semester
Credits
Tier II General Education
3.00
Tier II General Education
3.00
Tier II General Education
3.00
Tier II General Education
3.00
Tier II General Education
3.00
Tier II General Education
8.00
6th Semester
Credits
CYBV 301: Fundamentals of Cybersecurity
3.00
CSCV 352: Systems Programming Unix
3.00
CYBV 385: Intro to Cyber Operations
3.00
INFV 320 or CYBV 473
3.00
BASV 376: Mathematics for Applied Technology
3.00
ENGV 306: Advanced Composition
3.00

Fourth Year

7th Semester
Credits
CYBV 326: Network Analysis
3.00
CSCV 452 Principles of Operating Systems
3.00
CYBV 329: Cyber Ethics
3.00
CYBV 471: Assembly Language Programming for Security Professionals
3.00
CYBV 454: Malware Threat and Analysis
3.00
NETV 379: Cloud Computing
3.00
8th Semester
Credits
CYBV 388: Cyber Investigations and Forensics
3.00
CYBV 400: Active Cyber Defense
3.00
CYBV 480: Cyber Warfare
3.00
CYBV 479: Wireless Networking
3.00
CYBV 498: Senior Capstone
3.00

Log in to learn more about Colorado Heights University students

If you have questions about how your data is being used upon submission, please review the University Privacy Statement.