Applied Cyber Operations (MACO) - 336

Program Officer

Kehinde Adesanya "Kenny", LCDR, USN

Glasgow Hall East, Room E309

(732) 485-6203

kehinde.adesanya@nps.edu

Academic Associate

Timothy Shives
Glasgow Hall West, Room 3012

(831) 656-2788, DSN 756-2788

timothy.shives@nps.edu

Brief Overview

The Applied Cyber Operations (ACO) program addresses a range of operational and technical topics in defensive and offensive cyberspace operations. This includes computer network attack, active and passive defense, exploitation, cyber analysis via automated and manual toolsets, operations, policy, and engineering. Complementing the Cyber Systems and Operations program, Applied Cyber Operations covers a focused set of cyber topics suited for the technical enlisted workforce by providing graduates with a rigorous foundation in cyber security necessary for defensive and offensive cyber operations, as well as maintenance operations for the Global Information Grid (GIG). The degree covers the range of cyber topics needed by technicians serving military missions.

Designed to serve Navy enlisted personnel with Cryptologic Technician Networks (CTN) and Information Systems Technician (IT) ratings, as well as the respective enlisted personnel in other military services, the Applied Cyber Operations program is intended to provide a deep understanding of the implementation of national and military application of integrated lines of operation, including operation of the DoD Information Network Operations (DoDINOps), Defensive Cyberspace Operations (DCO), and Offensive Cyberspace Operations (OCO), cyber security fundamentals and the required technical operations underpinning these. Students will learn to seize and sustain an information advantage through all stages of operations, from compliance and early warning through detection, planning, targeting, cyber fires, assessing effects and resetting for follow-on plans and operations.

Site visits, laboratory exercises, seminars, guest speakers, and practical workshops complement traditional instruction. A cyber exercise is integrated into the program. A capstone project allows students to apply concepts introduced, demonstrated and practiced earlier in the program by working and reporting on topics of interest to stakeholders under the supervision of faculty experts. Tight integration with front-line war fighters ensures that capstone research is on target and rapidly integrated.

Requirements for Entry

A baccalaureate degree, or the equivalent, with grades resulting in an APC of at least 334 is required for direct entry. Applicants must possess a Bachelor of Science degree in a technical field, such as Computer Science, Electrical Engineering, Information or Engineering Technology, or a Bachelor’s degree accompanied by completion of the following training: A and C Schools for the CTN and IT respectively, namely, Joint Cyber Analysis Course (JCAC) or IT A School and IT System Administrator C School or equivalent enlisted service schools for USA, USAF, and USMC. A TOP SECRET clearance is required with eligibility for SCI access. 

Convenes

Fall and Spring

Program Length

Five Quarters. No JPME. If further information is needed, contact the Academic Associate or Program Officer for this program.

Degree

The Applied Cyber Operations degree is comprised of courses that, in combination, provide a coherent, logical approach to learning applied cyber systems and operations in a complex and rapidly evolving military domain. Of these courses, a subset comprises a specialization track. In addition to course work, each student must complete a capstone project.

The Master of Science in Applied Cyber Operations is awarded after satisfactory completion of a program that meets, as a minimum, the following degree requirements:

  1. All required courses must be satisfied through the course of study or through validation prior to graduation.
  2. Completion of a minimum of 40 quarter-hours of graduate-level courses.
  3. At least 12 quarter-hours of courses must be at the 4000 level.
    1. To ensure a sufficient breadth in operational understanding of the cyber domain, the following course topics must be satisfied as part of the course of study or through validation prior to graduation:
    2. Introduction to Cyber Systems and Operations (CY3000), or Command and Control (CC3000)
    3. Introduction to Computer Security (CS3600),
    4. One of Cyber Network & Physical Infrastructures (EC3730), Reverser Engineering (EC3740), or Information Operations Systems (EC3760),
    5. Applied Defensive Cyber Operations (CY4700) or Adversarial Cyber Operations (CY4710).
  4. Completion of a specialization track.
  5. Submission of an acceptable capstone project on a subject previously approved by the Information Science Department Chair.

Specialization Tracks

Each student in the Applied Cyber Operations program will choose a specialization track no later than the start of the second quarter of study. The current specializations offered by the Cyber Academic Group are as follows:

Network Operations (NetOps) Specialization

Course NumberTitleCreditsLecture HoursLab Hours
CS3670Secure Management of Systems

3

2

CS3690Network Security

4

1

Defense Specialization

Course NumberTitleCreditsLecture HoursLab Hours
CS4677Computer Forensics

3

2

CS4684Cyber Security Incident Response and Recovery

3

2

Adversarial Techniques Specialization

Course NumberTitleCreditsLecture HoursLab Hours
CS4648Software Reverse Engineering and Malware Analysis

3

2

CS4678Advanced Cyber Vulnerability Assessment

4

1

Typical Course of Study

Quarter 1

Course NumberTitleCreditsLecture HoursLab Hours
CS3600Introduction to Cybersecurity

4

1

CS3690Network Security

4

1

EC2700Introduction to Cyber Systems

3

3

CS2020Introduction to Programming

3

2

CS4903Research Methods in Computer Science

2

0

Quarter 2

Course NumberTitleCreditsLecture HoursLab Hours
CS3040Low Level Programming

3

2

CY3000Introduction to Cyber Systems and Operations

3

0

CY4710Adversarial Cyberspace Operations

3

2

CS4684Cyber Security Incident Response and Recovery

3

2

Quarter 3

Course NumberTitleCreditsLecture HoursLab Hours
CY4700Defensive Cyberspace Operations

3

3

CY4410Cyber Policy and Strategy

3

0

EC3760Information Operations Systems

3

2

CS4677Computer Forensics

3

2

CS4679Advances in Cyber Security Operations

4

1

CS4924Seminar Series in Computer Science and Cyber Systems and Operations

1

0

Quarter 4

Course NumberTitleCreditsLecture HoursLab Hours
CS3140Low-level Programming II

3

2

EC4765Cyber Warfare

3

2

CY4410Cyber Policy and Strategy

3

0

CY0809Capstone Project

0

8

CS4924Seminar Series in Computer Science and Cyber Systems and Operations

1

0

Quarter 5

Course NumberTitleCreditsLecture HoursLab Hours
EC3740Reverse Engineering in Electronic Systems

3

2

CS4684Cyber Security Incident Response and Recovery

3

2

IO4300Planning and Execution of Military Operations in the Information Environment

3

2

CY0809Capstone Project

0

8

CS4924Seminar Series in Computer Science and Cyber Systems and Operations

1

0