
Cyber Operations- Cyber Law and Policy (BAS)
Main Campus, Tucson, United States
Cyber Operations: Cyber Law and Policy Emphasis
Bachelor of Applied Science
Coursework Location(s)
Main/Tucson, Chandler, Online - Arizona Online, Pima Community College East, Sierra Vista, Yuma
Areas of Interest
- Business, Economics & Entrepreneurship
- Communication, Journalism & Public Relations
- Computer & Information Science
- Engineering & Technology
- Interdisciplinary Studies
- Law, Policy & Social Justice
- Mathematics, Statistics & Data Science
Overview
Take your career in cybersecurity to the executive level with the combined technical expertise and policy knowledge you need to drive big picture security initiatives. The Bachelor of Applied Science in Cyber Operations with an emphasis in Cyber Law and Policy through the College of Applied Science and Technology is one of three degree tracks. The Cyber Law and Policy track is an interdisciplinary program that integrates legal and policy knowledge with a strong technical foundation that prepares students for careers at the executive level. Students benefit from a state-of-the-art virtual learning environment (VLE) called Cyberapolis that allows students to learn about cyber security both offensively and defensively. The Law and Policy track conforms with academic requirements from the National Security Agency's Centers of Academic Excellence in Cyber Operations (CAE-CO) and Cyber Defense (CAE-CD)
Learning Outcomes
- Critical Thinking & Problem Solving; Demonstrate understanding of how variability affects outcomes; how to identify anomalous events; how to integrate and differentiate continuous functions of multiple variables; and how to solve complex problems using computation and scripting languages.
- Cyber Threat Intelligence; Describe and demonstrate how knowledge about an adversary's motivation, intentions, and methods are collected, analyzed, and disseminated to help security personnel and business staff to align resources and protect critical assets within an enterprise architecture.
- Defensive Cyber Operations; Describe, evaluate, and operate a defensive network architecture employing multiple layers of protection using technologies appropriate to meet mission security goals.
- Forensics; Demonstrate and explain how to acquire a forensically sound image; understand user activity; determine the manner in which an operating system or application has been subverted; identify forensic artifacts left by attacks; and recover deleted and/or intentionally hidden information.
- Law, Ethics, & Policy; Describe and explain the relationship between cyber ethics and law; criminal penalties related to unethical hacking; and apply the notion of Gray Areas to articulate where the law has not yet caught up to technology innovation.
- Malware Reverse Engineering; Safely perform static and dynamic analysis of unknown software, including obfuscated malware, to fully understand the software's functionality.
- Networking; Demonstrate a thorough understanding of how networks work at the infrastructure, network and applications layers; how they transfer data; how network protocols work to enable communication; and Networkinghow the lower-level network layers support the upper ones.
- Offensive Cyber Operations; Explain and demonstrate the phases of offensive cyber operations; what each phase entails; who has the authorities to conduct each phase; and how operations are assessed after completion.
- Operating Systems & Low Level Programming; Demonstrate a thorough understanding of various operating systems and be able to develop low level applications with the required complexity and sophistication to implement exploits for discovered vulnerabilities.
- Security Principles & Vulnerabilities; Demonstrate and explain the various types of vulnerabilities and their underlying causes; how security principles interrelate and are typically employee to achieve assured solutions; and explain how failures in fundamental security design principles can lead to system vulnerabilities that can be exploited as part of an offensive cyber operation.
Program Details
Sample Courses
- CYBV 329: Cyber Law, Ethics & Policy
- CYBV 442: Regulatory Implementation in Cyber Operations
- CYBV 480: Cyber Warfare
Career Fields
- Government agencies
- Military
- Defense
- Law enforcement
- Consulting
Similar Programmes
Master's & Postgraduate
24 months
Cybersecurity Risk Management (MBA)
Seton Hill University, Greensburg, United States
Earliest Intake
October 2025
Gross Tuition
28350 $
Bachelor's Degree
12 months
Cyber Security (Top-up)
University of Roehampton, London, United Kingdom
Earliest Intake
January 2026
Gross Tuition
17628 £
Bachelor's Degree
48 months
Cybersecurity BS MS
Mercy University, Bronx, United States
Earliest Intake
February 2026
Gross Tuition
23650 $
Bachelor's Degree
48 months
Cyber Operations - Defense & Forensics (BAS)
University Of Arizona, Tucson, United States
Earliest Intake
January 2026
Gross Tuition
39958 $
Bachelor's Degree
48 months
Cyber Operations- Cyber Engineering (BAS)
University Of Arizona, Tucson, United States
Earliest Intake
May 2026
Gross Tuition
39958 $
Uni4Edu AI Assistant



