Applied Cyber Operations (MACO) - 336
Program Officer
Kehinde Adesanya "Kenny", LCDR, USN
Glasgow Hall East, Room E309
(732) 485-6203
kehinde.adesanya@nps.edu
Academic Associate
Timothy Shives
Glasgow Hall West, Room 3012
(831) 656-2788, DSN 756-2788
timothy.shives@nps.edu
Brief Overview
The Applied Cyber Operations (ACO) program addresses a range of operational and technical topics in defensive and offensive cyberspace operations. This includes computer network attack, active and passive defense, exploitation, cyber analysis via automated and manual toolsets, operations, policy, and engineering. Complementing the Cyber Systems and Operations program, Applied Cyber Operations covers a focused set of cyber topics suited for the technical enlisted workforce by providing graduates with a rigorous foundation in cyber security necessary for defensive and offensive cyber operations, as well as maintenance operations for the Global Information Grid (GIG). The degree covers the range of cyber topics needed by technicians serving military missions.
Designed to serve Navy enlisted personnel with Cryptologic Technician Networks (CTN) and Information Systems Technician (IT) ratings, as well as the respective enlisted personnel in other military services, the Applied Cyber Operations program is intended to provide a deep understanding of the implementation of national and military application of integrated lines of operation, including operation of the DoD Information Network Operations (DoDINOps), Defensive Cyberspace Operations (DCO), and Offensive Cyberspace Operations (OCO), cyber security fundamentals and the required technical operations underpinning these. Students will learn to seize and sustain an information advantage through all stages of operations, from compliance and early warning through detection, planning, targeting, cyber fires, assessing effects and resetting for follow-on plans and operations.
Site visits, laboratory exercises, seminars, guest speakers, and practical workshops complement traditional instruction. A cyber exercise is integrated into the program. A capstone project allows students to apply concepts introduced, demonstrated and practiced earlier in the program by working and reporting on topics of interest to stakeholders under the supervision of faculty experts. Tight integration with front-line war fighters ensures that capstone research is on target and rapidly integrated.
Requirements for Entry
A baccalaureate degree, or the equivalent, with grades resulting in an APC of at least 334 is required for direct entry. Applicants must possess a Bachelor of Science degree in a technical field, such as Computer Science, Electrical Engineering, Information or Engineering Technology, or a Bachelor’s degree accompanied by completion of the following training: A and C Schools for the CTN and IT respectively, namely, Joint Cyber Analysis Course (JCAC) or IT A School and IT System Administrator C School or equivalent enlisted service schools for USA, USAF, and USMC. A TOP SECRET clearance is required with eligibility for SCI access.
Convenes
Fall and Spring
Program Length
Five Quarters. No JPME. If further information is needed, contact the Academic Associate or Program Officer for this program.
Degree
The Applied Cyber Operations degree is comprised of courses that, in combination, provide a coherent, logical approach to learning applied cyber systems and operations in a complex and rapidly evolving military domain. Of these courses, a subset comprises a specialization track. In addition to course work, each student must complete a capstone project.
The Master of Science in Applied Cyber Operations is awarded after satisfactory completion of a program that meets, as a minimum, the following degree requirements:
- All required courses must be satisfied through the course of study or through validation prior to graduation.
- Completion of a minimum of 40 quarter-hours of graduate-level courses.
- At least 12 quarter-hours of courses must be at the 4000 level.
- To ensure a sufficient breadth in operational understanding of the cyber domain, the following course topics must be satisfied as part of the course of study or through validation prior to graduation:
- Introduction to Cyber Systems and Operations (CY3000), or Command and Control (CC3000)
- Introduction to Computer Security (CS3600),
- One of Cyber Network & Physical Infrastructures (EC3730), Reverser Engineering (EC3740), or Information Operations Systems (EC3760),
- Applied Defensive Cyber Operations (CY4700) or Adversarial Cyber Operations (CY4710).
- Completion of a specialization track.
- Submission of an acceptable capstone project on a subject previously approved by the Information Science Department Chair.
Specialization Tracks
Each student in the Applied Cyber Operations program will choose a specialization track no later than the start of the second quarter of study. The current specializations offered by the Cyber Academic Group are as follows:
Network Operations (NetOps) Specialization
CS3670 | Secure Management of Systems | | 3 | 2 |
CS3690 | Network Security | | 4 | 1 |
Defense Specialization
CS4677 | Computer Forensics | | 3 | 2 |
CS4684 | Cyber Security Incident Response and Recovery | | 3 | 2 |
Adversarial Techniques Specialization
CS4648 | Software Reverse Engineering and Malware Analysis | | 3 | 2 |
CS4678 | Advanced Cyber Vulnerability Assessment | | 4 | 1 |
Typical Course of Study
Quarter 1
CS3600 | Introduction to Cybersecurity | | 4 | 1 |
CS3690 | Network Security | | 4 | 1 |
EC2700 | Introduction to Cyber Systems | | 3 | 3 |
CS2020 | Introduction to Programming | | 3 | 2 |
CS4903 | Research Methods in Computer Science | | 2 | 0 |
Quarter 2
CS3040 | Low Level Programming | | 3 | 2 |
CY3000 | Introduction to Cyber Systems and Operations | | 3 | 0 |
CY4710 | Adversarial Cyberspace Operations | | 3 | 2 |
CS4684 | Cyber Security Incident Response and Recovery | | 3 | 2 |
Quarter 3
CY4700 | Defensive Cyberspace Operations | | 3 | 3 |
CY4410 | Cyber Policy and Strategy | | 3 | 0 |
EC3760 | Information Operations Systems | | 3 | 2 |
CS4677 | Computer Forensics | | 3 | 2 |
CS4679 | Advances in Cyber Security Operations | | 4 | 1 |
CS4924 | Seminar Series in Computer Science and Cyber Systems and Operations | | 1 | 0 |
Quarter 4
CS3140 | Low-level Programming II | | 3 | 2 |
EC4765 | Cyber Warfare | | 3 | 2 |
CY4410 | Cyber Policy and Strategy | | 3 | 0 |
CY0809 | Capstone Project | | 0 | 8 |
CS4924 | Seminar Series in Computer Science and Cyber Systems and Operations | | 1 | 0 |
Quarter 5
EC3740 | Reverse Engineering in Electronic Systems | | 3 | 2 |
CS4684 | Cyber Security Incident Response and Recovery | | 3 | 2 |
IO4300 | Planning and Execution of Military Operations in the Information Environment | | 3 | 2 |
CY0809 | Capstone Project | | 0 | 8 |
CS4924 | Seminar Series in Computer Science and Cyber Systems and Operations | | 1 | 0 |