CY3000 Introduction to Cyber Systems and Operations (3-0)
This course provides an overview of the national and military application of integrated lines of operations including operation of the Global Information Grid (GIG), defensive cyber operations, offensive cyber operations and the required technical and non-technical intelligence underpinning these. Through a series of guest lectures, students will be exposed to all aspects of cyber systems and operations ranging from the best in industry to actual plans and operations at the national and Combatant Command and component levels. Classification: U.S. citizenship and TOP SECRET clearance with eligibility for SCI access.
CY3100 Introduction to Communications Networks (4-1)
The purpose of this course is to develop literacy and familiarity with the technologies, techniques, and systems that provide the physical communications and point-to-point communications control upon which all communications networks are based. Physical layer topics include concepts in signals, information, analog and digital signals, signal corruption, signal reception, binary and non-binary data communications, communications channels, and radio communications concepts, IEEE standards 802.11 and 802.16, network interface controllers, switches, repeaters, multiplexers, antennas, A/D & D/A converters, and vocoders. Datalink layer concepts include connection vs. connectionless oriented, packet vs. circuit mode, error control, flow control, synchronization, framing, logical link control, media access control, Ethernet, Point-to-Point Protocol (PPP), and High-level Data Link Control (HDLC). Emphasis is on military communications systems to include Link 16, DSCS, Milstar, and WNW.
CY3110 Internet Protocols (3-1)
This course covers basic device (computers, smart-phones and PDAs) communications and networking through the study of the fundamental principles and technologies employed to implement the upper three layers of the TCP/IP protocol stack. The lower two-physical (1) and link (2)-layers are addressed only insofar as to provide a complete bit-level to message-level overview regarding each layer's role in supporting end-to-end communications. For the three upper layers, the course delves into analysis of the dominant protocols employed (e.g., IP, DNS, ICMP, HTTP, DHCP, TCP, UDP, RIP, OSPF, BGP, MobileIP, VoIP, and MPLS). In addition to understanding the basic operation, each protocol is also considered in the context of basic security challenges (confidentiality, integrity, availability) encountered in a distributed, internetworked environment.
CY3300 Cyber Communications Architectures (Same as EO3730) (4-0)
The purpose of this course is to develop literacy and familiarity with Navy, DoD, and allied enterprise information systems and emerging technology trends. It presents basic concepts in conventional and military telephony and telecommunication networks; examines DoN implementations from intra-ship, ship-to-ship and long haul and discusses architectures and components of the GIG including both classified and unclassified networks. It discusses interoperability of diverse network architectures and the impact of mobile platforms on operations. Classification: SECRET
Prerequisites: CY3100, CY3110, CS3030, or consent of the instructor.
CY3602 Network Operations II (3-2)
This course is a sequel to Network Operations I, with a focus on how to deal with network attacks and compromises. The goal is a resilient network that can meet operational and mission needs even in the face of attacks. Students will learn how to detect and respond to attacks and compromises while keeping the network operational to the extent possible. Topics covered include self-assessment through vulnerability and penetration testing, using firewalls and intrusion detection and prevention systems to monitor network traffic and system activity; and an introduction to established processes for cyber forensics and attribution, incident response, and recovery.
Prerequisites: IS3502, CS3600, or consent of the instructor.
CY3800 Topics in Signals Operations (3-0)
Students will be introduced to concepts and systems for managing and ensuring effective employment of the electromagnetic spectrum (EMS). Topics include DoD, other government and Intelligence Community systems for communications; Signals Intelligence (SIGINT), Radio Frequency (RF) exploitation, electronic counter measures, electronic counter-counter measures, Precision Navigation and Timing (PNT), and EMS management. Students will better understand the role of these in building to and ensuring Naval Information Dominance and a US strategic and operational electronic advantage. Classification: U.S. citizenship and TOP SECRET clearance with eligibility for SCI access.
Prerequisites: CY3100, CY3300, or consent of the instructor.
CY4400 Cyber Mission Planning (3-0)
This course details the process of mission planning in the cyber warfare domain and its integration of cyber with other warfare domains. All phases of mission planning and execution for cyber missions in both direct and supporting roles are covered. Topics include requirements development/solicitation, managing expectations, targeting considerations, munitions development and selection, preparation of the environment, mission deconfliction in the cyber battlefield, balancing the needs of offensive and defensive stakeholders, and cyber battle damage assessment. Classification: U.S. citizenship and TOP SECRET clearance with eligibility for SCI access.
Prerequisites: CY4700 or consent of the instructor.
CY4410 Cyber Policy and Strategy (3-0)
This course explores the emerging strategies, policies and doctrine associated with cyber operations and military operations affected by cyberspace. The student will review the latest guidance provided by the US government at the national, interagency, DOD, and naval levels and relate these materials to the national strategy of the US. Special emphasis is provided for the products of US Cyber Command and Fleet Cyber Command/Tenth Fleet. These materials are compared to the emerging strategies and doctrine of other countries. Classification: U.S. citizenship and TOP SECRET clearance with eligibility for SCI access.
Prerequisites: CY3000, CY3130, or consent of the instructor.
CY4600 Network Operations in a Contested Environment (3-2)
This is a course in offensive cyber operations and effects achievable by cyber means in a contested environment. It examines the network environment as a domain under contention and related information operations. Existing architectures and infrastructures for conducting offensive operations are studied. This course develops the literacy and competencies necessary to understand potential problems and realistic solutions for critical non-kinetic, cyber-related warfare issues for the United States. Classification: U.S. citizenship and TOP SECRET clearance with eligibility for SCI access.
Prerequisites: CY3602 or consent of the instructor.
CY4650 Information Management for Cyber Operations (4-0)
This course covers the acquisition and management of information for timely and effective decision-making. Topics include the collection, storing and processing of large amounts of data; autonomous processing including mining, matching, filtering and translating data; issues relating to scalability, performance and real-time requirements; and identification of appropriate data sources and tools.
Prerequisites: DA3105, CY4400, CY4600, or consent of the instructor.
CY4700 Cyber Wargame: Blue Force Operations (2-5)
This course explores the development of cyber-oriented war games and exercises from the perspective of maintaining a high state of readiness in the face of hostile action. Topics include fundamentals of game theory, scenario selection, scenario development, and execution. Following scenario definition, students will develop a strategy for defending and operating their networks while responding to hostile activities. Emphasis is placed on risk assessment, employment of forces and assets, early detection of threats and maintaining services in an increasingly degraded environment. This course is designed to be offered simultaneously with Cyber Wargame Red Force Operations and culminates in a week-long cyber exercise in which the students participate in the blue force role
Prerequisites: CS3600 or CS3690 or DA3104, or consent of the instructor.
CY4710 Cyber Wargame: Red Force Operations (2-5)
This course explores the development of cyber-oriented war games and exercises from the perspective of maintaining a high state of readiness in the face of hostile action. Topics include fundamentals of game theory, scenario selection, scenario development, and execution. Following scenario definition, students will develop a strategy for defending and operating their networks while responding to hostile activities. Emphasis is placed on risk assessment, employment of forces and assets, early detection of threats and maintaining services in an increasingly degraded environment. This course is designed to be offered simultaneously with Cyber Wargame Blue Force Operations and culminates in a week-long cyber exercise in which the students participate in the red force role.
Prerequisites: CY4600 and CY4700; or any one of: CS3695, CS4678, CS4558, EC4755, EC4765, EC4785; or consent of the instructor.
CY4750 Advanced Cyber systems and Operations (3-1)
This course serves as a capstone experience in which the students are immersed in a current operational or policy challenges related provided by the Information Dominance Corps community stakeholders. The assigned task will involve proposed cyber operations in support of an existing or anticipated operational plan. Student teams will develop courses of action (COA) that address legal, ethical, political, technical, tactical, operational and strategic implications. The recommended COA will be presented to the stakeholders. Classification: U.S. citizenship and TOP SECRET clearance with eligibility for SCI access.
Prerequisites: CY4400, CY4600.
CY4900 Research Topics in Cyber Systems and Operations (1-0)
This course is designed to help students determine, shape and explore the foundational research for their theses and to introduce them to advances in cyber technologies and research. Students are expected to register for this course in the second quarter of their course of study.
CY4901 Cyber Systems and Operations Research Methods (1-0)
The objective of this course is to introduce students to research design and execution in the context of cyber systems and operations. Topics include a review of quantitative, qualitative, and heterogeneous research methods. Framing a hypothesis, collection of background material and literature review, the use of models and experimentation as part of a scientific process, testing and analysis, and the determination of well-grounded conclusions will be covered. The development of the thesis, writing techniques and thesis management will be covered. Students are expected to register for this course in the third quarter of their studies.
Thesis and Capstone Courses
CY0809 Capstone Project (0-8)
Every student engaged in a curriculum capstone project will enroll in this course.
CY0810 Thesis Research (0-8)
Every student conducting thesis research will enroll in this course.
Cyber Curriculum Courses from Other Departments
CS3030 Computer Architecture and Operating Systems (4-0)
This course provides an overview of basic computer hardware concepts and operating systems software. The following topics are covered: basic computer concepts; data representation; elements of computer architecture and operation; processor and process management; multiprogramming; memory management; and file management. Future trends in computer hardware and operating systems will be discussed.
DA3105 Conflict and Cyberspace (4-1)
This course examines how cyberspace, particularly the Internet, can serve as a tool, target, and source of conflict for both state and nonstate actors. Topics include: characteristics of cyberspace, technology trends, power in cyberspace, cyber-based information operations (IO), cyber surveillance, domestic and international laws governing cyber operations, cyber crime, cyber activism and hacktivism, cyber terrorism, cyber warfare, and cyber defense.
IS3502 Network Operations I (4-2)
This course introduces the basics of network operations. Topics covered include but are not limited to configuring and managing networks, routers, and servers (file, e-mail, web, DNS, printer, etc.); network monitoring and traffic analysis; storage and bandwidth allocation; quality of service, performance monitoring and analysis; deploying and managing firewalls and malware/intrusion detection/prevention systems; configuring access controls; managing and retaining logs; setting up VPNs and secure connections; business continuity and disaster recovery planning; managing software patches; and network policy and compliance.
CS3600 Introduction to Computer Security (4-2)
This course provides a comprehensive overview of the terminology, concepts, issues, policies, and technologies associated with the fields of Information and Software Assurance. It covers the notions of threats, vulnerabilities, risks, and safeguards as they pertain to the desired information security properties of confidentiality, integrity, authenticity, and availability for all information that is processed, stored, or transmitted in/by information systems. This is the entry point prerequisite for all other Computer Security Track courses.
Prerequisites: CS2011 or CS3030.
CS3670 Information Assurance: Secure Management of Systems (3-2)
This course provides students with a security manager's view of the diverse management concerns associated with administering and operating an automated information system facility with minimized risk. Students will examine both the technical and nontechnical security issues associated with managing a computer facility, with emphasis on DoD systems and policies. Students have the opportunity to earn the following CNSS (formerly NSTISSI) certifications: INFOSEC Professional, System Administration in Information Systems Security, and ISSO.
CS3690 Network Security (4-1)
This course covers the concepts and technologies used to achieve confidentiality, integrity, and authenticity for information processed across networks. Topics include: fundamentals of TCP/IP-based networking, core network security principles, traffic filtering types and methodology, packet-level traffic analysis, employment of cryptography, tunneling/encapsulation, Public Key Infrastructure (PKI), remote authentication protocols, and virtual private networks based on the IPSec, L2TP, and SSL protocols.
Prerequisites: CS3600 and CS3502 or IS3502.
CS3695 Network Vulnerability Assessment and Risk Mitigation (3-2)
This course provides a basis for understanding the potential vulnerabilities and their mitigation in networked systems by studying methods to: (1) obtain information about a remote network, (2) to possibly exploit or subvert systems residing on that network and (3) techniques to mitigate risks to networked systems. Labs provide practical experience with current network attack and vulnerability assessment tools, as well as tools and methodologies for a systematic approach to reducing vulnerabilities. A final project that demonstrates skill and knowledge is required.
Prerequisite: One of the following: CS3502 or IS3502 or CS3690 or permission of the instructor.