Mar 28, 2024  
2019 Graduate Catalog 1.2 (SUMMER - FALL) 
    
2019 Graduate Catalog 1.2 (SUMMER - FALL) [ARCHIVED CATALOG - Consult with Your Academic Advisor for Your Catalog Year]

Cyber Operations Advanced Certificate


The certificate in Cyber Operations provides students with an understanding of the tools and techniques used to actively protect cyberspace systems and networks. Students taking this certificate program learn about state-of-the-art tools and techniques in the disciplines of cyber defense and cyber attack domains. Students will apply the latest tools and technologies in hands-on, controlled experimental environments. In addition, students will examine how data hiding methods such as steganography and anonymity are used by adversarial actors and threat agents in the conduct of cyberspace operations. Students will also learn how to identify and mitigate adversarial cyber intrusions and attacks.

Cyber operations has become a key area within the discipline of cybersecurity. There is an overwhelming need in both the government and private sectors for individuals who have knowledge of this technical discipline. Cyber operations is an interdisciplinary area that covers the entire scope of cyberspace and related operations, from both a technical and a non-technical perspective. As such, the Cyber Operations certificate provides a basic foundation in computer architecture, cybersecurity testing, vulnerability assessment, security policy/procedures, penetration testing, and incident response/recovery. Having a Cyber Operations certificate enables Utica College to reach out to a broad range of individuals who are seeking to gain an understanding of this new and emerging field.

Students who complete the certificate will be able to:

  • Analyze and assess tactics, techniques and procedures for cyberspace operations in the context of legal and ethical issues and constraints
  • Apply vulnerability assessment and penetration testing tools to assess the security posture of cyberspace systems
  • Conduct cyber defense and cyber attack experiments
  • Apply data hiding methods to cyberspace operations
  • Apply network forensic tools and techniques to diagnose system problems and cyber incidents.