Cyber Systems and Operations (CSO) (DL & Res) - Curriculum 326/327

Program Officer

Brian Judy, LCDR, USN

Glasgow West, Room 3010

831-656-3635, DSN 756-3635

bpjudy@nps.edu

Academic Associate

Duane Davis, Ph.D.

Code CS, Glasgow East, Room 212

831-656-2239, DSN 756-2239

dtdavi1@nps.edu

Brief Overview

The MS in CSO degree is a multidisciplinary program that addresses the broad range of cyber topics needed by leaders, managers, and operators supporting military missions. The curriculum builds upon the technical foundations of Computer Science and Electrical and Computer Engineering to address a broad range of cyberspace operations requirements: computer network attack, defense, and exploitation; cyber analysis, operations, planning and engineering; and cyber intelligence operations and analysis.

Designed for a cadre of students with diverse backgrounds, this degree program produces graduates with a deep understanding of the national and military application of integrated lines of operation including operation of the DOD Information Network (DODIN), Defensive Cyber Operations (DCO), Offensive Cyber Operations (OCO), and the required technical and nontechnical intelligence operations underpinning these. Students learn how to seize and sustain an information advantage through all stages of operations, from early warning through detection, planning, targeting, cyber fires, assessing effects and resetting for follow-on plans and operations.

Requirements for Entry

This curriculum is open to officers of the U.S. Armed Forces and civilian employees of the U.S. Federal Government. A baccalaureate degree, or the equivalent, with grades resulting in an APC of at least 334, basic computer programming capability, and a general understanding of computer architectures and operating systems is required for direct entry. Applicants with demonstrated proficiency but failing meet any of these requirements may be admitted to the program but will be required to participate in the introductory quarter (Quarter 0). A TOP SECRET clearance is required with eligibility for SCI access.

Entry Date

Cyber Systems and Operations is a seven-quarter resident course of study with entry dates in March and September. DL program duration will depend upon the number of simultaneous courses taken. If further information is needed, contact the Academic Associate or Program Officer for this curriculum. An introductory quarter (Quarter 0) is available in July and January for students with non-technical backgrounds.

Degree Requirements

The Master of Science in Cyber Systems and Operations is awarded after the satisfactory completion of a program meeting, as a minimum, the following degree requirements:

  1. All courses must be satisfied through the course of study or through validation prior to graduation.
  2. Completion of a minimum of 40 quarter-hours of graduate-level courses, of which at least 16 quarter hours are 4000-level courses.
  3. To ensure a sufficient breadth in operational understanding of the cyber domain, the following course topics must be satisfied as part of the course of study or through validation prior to graduation: Cyber Policy and Strategy (CY4410), Network Operations in a Contested Environment (CY4600) or Information Operations Systems (EC3760), Applied Defensive Cyber Operations (CY4700), Adversarial Cyber Operations (CY4710).
  4. Minimum degree requirements of the NPS must be met.
  5. Completion of an acceptable thesis or capstone project on a subject previously approved by the Information Sciences Department Chair.

Program Length

Seven Quarters with JPME.

Subspecialty

Completion of this curriculum qualifies a Navy Officer for the 6208P subspecialty

Typical Course of Study -- Fall Entry

Quarter 0

Course NumberTitleCreditsLecture HoursLab Hours
CS2020Introduction to Programming

3

4

EC2700Introduction to Cyber Systems

3

3

MA2025Logic and Discrete Mathematics I

4

1

MA1113Single Variable Calculus I

4

0

Quarter 1

Course NumberTitleCreditsLecture HoursLab Hours
CS3600Introduction to Computer Security

4

2

CS3040Low Level Programming

4

2

EC3730Cyber Network and Physical Infrastructures

3

2

CY3000Introduction to Cyber Systems and Operations

3

0

CS4924Seminar Series in Computer Science and Cyber Systems and Operations

1

0

Quarter 2

Course NumberTitleCreditsLecture HoursLab Hours
EC3760Information Operations Systems

3

2

CS3070Operating Systems

3

2

CY3800Topics in Signals Operations

3

0

CS4924Seminar Series in Computer Science and Cyber Systems and Operations

1

0

Quarter 3

Course NumberTitleCreditsLecture HoursLab Hours
CS3690Network Security

4

1

CY4410Cyber Policy and Strategy

3

0

EC4765Cyber Warfare

3

2

OS3307Modeling Practices for Computing

4

1

CY4900Research Topics in Cyber Systems and Operations

1

0

Quarter 4

Course NumberTitleCreditsLecture HoursLab Hours
ELECTCS/CY/IS/EC Cyber Elective

CY4700Defensive Cyberspace Operations

3

3

NW3230Strategy & War

4

2

ELECTCS/CY/IS/EC Cyber Elective

CY4901Cyber Systems and Operations Research Methods

1

0

Quarter 5

Course NumberTitleCreditsLecture HoursLab Hours
CS4558Network Traffic Analysis

3

2

CY4710Adversarial Cyberspace Operations

3

3

NW3275Joint Maritime Operations - part 1

4

0

CY0810Thesis Research

0

8

CS4924Seminar Series in Computer Science and Cyber Systems and Operations

1

0

Quarter 6

Course NumberTitleCreditsLecture HoursLab Hours
EC3740Reverse Engineering in Electronic Systems

3

2

NW3276Joint Maritime Operations - part 2

2

2

ELECTCS/CY/IS/EC Cyber Elective

CY0810Thesis Research

0

8

CS4924Seminar Series in Computer Science and Cyber Systems and Operations

1

0

Quarter 7

Course NumberTitleCreditsLecture HoursLab Hours
EC3740Reverse Engineering in Electronic Systems

3

2

NW3285Theater Security Decision Making

4

0

CY0810Thesis Research

0

8

CY0810Thesis Research

0

8

CS4924Seminar Series in Computer Science and Cyber Systems and Operations

1

0

Educational Skill Requirements

  1. Cyberspace Operations (CO) Foundations. Graduates of the CSO program will: have acquired knowledge of Cyber Warfare and Cyberspace Operations concepts and methodologies; demonstrate a proficient application of the technical dimensions of Cyberspace Operations; and be able to analyze, synthesize, and evaluate management, engineering, and operational approaches to solve complex problems within cyber warfare. This foundation must provide graduates who possess the educational skills to:
    • Develop and execute well-formed strategies and plans to effectively operate and maintain ready information and control networks supporting military operations.
    • Develop and execute best practices and methodologies for effective Defensive Cyberspace Operations (DCO) to include assessment of threat vectors and vulnerability assessment, means to mitigate cyber attacks and exploitation through active defense, and network maneuver methodologies.
    • Build and assess disparate behaviors and indicators within cyberspace to ascertain Cyber Intelligence supporting military operations.
    • Define, identify, and assess Cyber Key Terrain from with supporting System of Systems and associated functional processes.
    • Be able to generate operational risk factors in support of mission assurance and cyber operations.
  2. Technical Foundations. Graduates will be able to apply critical thinking, fundamental mathematical, computer science, and engineering concepts underpinning Cyberspace Operations in an operational context. In particular, graduates will be able to employ Cyberspace Operations concepts to solve operationally relevant problems. This education will be founded in the following technical areas: computer architecture; operating systems; virtualization; networking, mobile, and wireless technologies; cyber physical systems and industrial control systems; computer and network security; computer programming; reverse engineering and digital forensics; data analytics; probability; statistics; and signals operations.
  3. Military Application. Officers will be able to analyze cyber requirements within military operations and synthesize and evaluate courses of action that include the use of Cyber capabilities within the full range of military capabilities (kinetic to non-kinetic). These skills will be reinforced through the use of the Joint Operational Planning Process, Joint Targeting Cycle, Joint Doctrine on Cyberspace Operations, and related operational concepts. The officer is to build skills for the effective application of cyber capabilities, effects, and be able to integrate Cyberspace Operations within operational planning and execution processes. In particular, the Officer will be able to develop, compare, and evaluate courses of action incorporating Cyberspace Operations and identify targets and processes against which cyber capabilities can be employed to achieve operational effects in support of operational objectives.
  4. Organizational Construct and Policy Context. The officer will be able to describe the administrative and operational structures and command relationships of the organizations and commands that operate within the cyberspace domain. The officer must have foundational understanding of the application of DOD / DON policies, related strategies, authorities, and the Law of Armed Conflict in the execution of Cyberspace Operations, Cyber Warfare, and associated capabilities. The officer will be able to illustrate the employment of these organizational relationships and policy, strategy, authorities, and legal context in an operational environment (i.e., Cyberspace Operations implications from U.S. law, National Security Strategy, DOD Cyber strategies, DOD and related policies, Rules of Engagement, etc.)
  5. Comprehension of the Cyberspace Environment. The officer will understand the characteristics of friendly, neutral, and adversary Cyber environments and likely methodologies for adversary employment of cyber capabilities (e.g., infrastructure, prevalent technologies, policy limitations or deterrence, etc.). The officer will understand the parameters of Cyberspace Situational Awareness methodologies for attribution, collateral damage effects, and operational risk of Cyberspace Operations. Further, the officer will understand architecture and design principles that underpin cyberspace as well as demonstrate the ability to analyze specific cyber system implementations to identify vulnerabilities and potential attack vectors. The officer must also understand operational implications when the environment shifts from a permissive to a contested environment.
  6. Relationship to other Warfare Areas. The officer will understand and illustrate the relationships, overlaps, and interdependencies between cyberspace and traditional warfare areas to include air, surface, undersea, amphibious, strike, and expeditionary warfare. Further, the officer will also demonstrate understanding of the relationships and interdependencies between cyberspace and space and Electromagnetic Maneuver Warfare. In particular, the officer will be able to describe alternative approaches to conducting Cyberspace Operations within an Anti-Access/Area Denial scenario.
  7. Independent Research. The officer will demonstrate the ability to conduct independent research and investigation through the completion of a thesis or capstone project which meets the requirements of the conferred degree. Thesis or capstone work will be conducted in a framework that exercises the practice of innovation, critical thinking, problem solving, and real-world applicability. Where possible, the topic of the thesis or capstone project will support operational focus areas defined by the mission area sponsor. Further, the officer will be able to present research goals and results in both written and oral form.
  8. Joint Professional Military Education (JPME). Per community requirements, the officer will have an understanding of warfighting within the context of operational art to include: strategy and war, theater security decision making, and joint maritime operations. Completing the Naval War College four-course series leading to Intermediate Level Professional Military Education and JPME phase I certification fulfills this requirement.

Curriculum Sponsor and ESR Approval Authority

DCNO for Information Dominance (N2/N6).