Skip to content. | Skip to navigation

Personal tools

Navigation

Cyber Operations Certificate

Cyber Operations Certificate in the Department of Electrical Engineering and Computing Systems at University of Cincinnati

Cyber Operations Certificate

Academic Director:

Increasing reliance on and complexity of computing systems, particularly large-scale distributed systems and databases, and increasing sophistication of attacking entities have made it necessary to introduce, at all levels of system design, maintenance, and administration, personnel who are highly trained in cyber operations. As examples, a cyber-ops specialist working at the operational level is trained to identify procedural vulnerabilities and suggest changes to remove them, a cyber-ops specialist working at the system administration level is trained to detect intrusions and attacks and prevent or limit damage that they may incur, a cyber-ops specialist working at the OS level is trained to analyze (reverse engineer) code to detect anomalies and malware and to develop strategies that prevent or limit damage due to such software.

The cyber operations program at UC provides such training.There is a basic, mandatory component of the program that covers security and safety principles, some of which are applicable to all operational and system levels, and some are foundational to building specific secure systems. The program also offers specialized, optional components allowing a student to concentrate on one or two specific aspects of cyber operations. Upon completion of the program, the student will receive a Master of Science degree in either Computer Science or Computer Engineering and a certificate of proficiency in cyber operations in recognition of having acquired these important skills. Award of this certificate will be mentioned on the student's transcript.

A student entering a Master of Science program, cybersecurity/cyber operations track, after receiving a Bachelor of Computer Science or Computer Engineering degree, must either take the  required undergraduate prerequisite courses (described below), which do not count for graduate credit, or prove to the program director that courses with the same content have recently been taken either at UC or a comparable four-year institution.

An undergraduate may complete the cyber operations program through the ACCEND program. ACCEND is an accelerated program that allows a student to earn Baccalaureate and Master's degrees in Computer Science or Computer Engineering in five years.

A graduate or ACCEND student will receive a certificate of proficiency in cyber operations upon completion of the cybersecurity/cyber operations track associated with a Master of Science in Computer Science or Computer Engineering degree. This track requires completing seven graduate courses that target 8 mandatory knowledge units, two prerequisite undergraduate courses that target two additional mandatory knowledge units, and three additional graduate courses such that four optional knowledge units are covered.

Learning Outcomes for Cyber Operations Certificate students include: 

  1. Knowledge of how to legally protect sensitive and proprietary data from theft, manipulation, and unauthorized access
  2. Acquisition of hands-on experience with detecting intrusion and attacks, identifying attackers, mitigating or preventing the effect of an attack. 
  3. Ability to communicate results of analysis effectively (visually and verbally) to a broad audience. 

 

Sample CS Curriculum (36 credit hours) 

  • 18-IT-2030C (3cr) Information Security and Assurance
  • 15-POL-2035 (3cr) Cyber Security Policy and Strategy
  • 20-EECE-6029 (3cr) Operating Systems
  • 20-EECE-7037 (3cr) Malware Analysis
  • 20-EECE-6061 (3cr) Network Exploitation
  • 20-CS-6055 (3cr) Cyber Defense Overview
  • 20-CS-6056 (3cr) Security Vulnerability Assessment
  • 20-CS-6043 (3cr) Computer Networking
  • 20-CS-6070 (3cr) Theory of Formal Languages and Automata
  • 20-CS-6097 (3cr) Wireless and Mobile Networks
  • 20-CS-6021 (3cr) Mathematical Logic
  • 20-CS-6065 (3cr) Cloud Computing

  

Sample CE Curriculum (36 credit hours) 

  • 18-IT-2030C (3cr) Information Security and Assurance
  • 15-POL-2035 (3cr) Cyber Security Policy and Strategy
  • 20-EECE-6029 (3cr) Operating Systems
  • 20-EECE-7037 (3cr) Malware Analysis
  • 20-EECE-6061 (3cr) Network Exploitation
  • 20-EECE-6038C (3cr) Advanced Microsystem Design
  • 20-EECE-6017C (3cr) Embedded Systems
  • 20-EECE-7095 (3cr) Computer Architecture
  • 20-EECE-6061 (3cr) Network Security
  • 20-CS-6055 (3cr) Cyber Defense Overview
  • 20-CS-6056 (3cr) Security Vulnerability Assessment
  • 20-CS-6043 (3cr) Computer Networking
  • 20-CS-6097 (3cr) Wireless and Mobile Networks
  • 20-CS-6021 (3cr) Mathematical Logic

 

Admission Requirements

There are four components to admission to the Data Science Certificate program:

  1. Applicants must have a baccalaureate degree (BS or BA) in Computer Science, Computer Engineering, or Electrical Engineering.
  2. Applicants must convince the program director of a deep commitment to legally protecting data that is considered sensitive or proprietary by US Corporations and State and Federal government.
  3. Applicants must be proficient in a low level language such as C.
  4. Applicants must have appropriate course work as described below.

     

Applicants to the program must provide transcripts and official university course descriptions to show that they have obtained a grade of at least 3.0/4.0 (B or better) for at least undergraduate level background courses in the following areas:

  1. operating systems: particularly kernel programming as in 20-EECE-4029,
  2. mathematics: including discrete mathematics, statistics, and probability, and
  3. programming and algorithms: including data structures, experience developing medium-large software in C++ and/or java, and design and analysis of algorithms.
 

 

To learn more about the Cyber Operations Certificate Please Contact:

Dr. John Franco by email at  or phone at 513.556.1817.