Cyber Operations Graduate Certificate
Specialize in Cyber Operations
Credits
15
Start Terms
Fall
|Spring
|Summer
Available
Online
Tuition
$3,365.10
estimated per semester
Dakota State University’s Graduate Certificate in Cyber Operations provides working professionals with essential knowledge of technical cyber operations including a deep dive into software reverse engineering, binary exploitation, and malware analysis. Students will be equipped with the skills needed to analyze and apply technical cyber security concepts to protect modern systems.
Meet the demand for cybersecurity professionals, which is projected to grow by 33% by 2033 in the U.S. according to the U.S. Bureau of Labor Statistics. The program builds on your knowledge gained from a master’s degree and work experience, allowing you to upskill your expertise without the full requirements of a Ph.D.
Prepare for the future
This certificate is specifically designed for technical cyber security professionals. DSU’s graduate programs are recognized for their high degree of practical application and hands-on curriculum with a deep theoretical foundation. Advance your technical skills with five core courses from the Ph.D. in Cyber Operations degree.
After completion of the certificate, students who wish to pursue the Ph.D. will submit a full application and, if admitted, can apply the 15 credits toward their doctoral degree.
Courses
CSC 840 |
Cyber Operations I |
CSC 841 |
Cyber Operations II |
CSC 844 |
Advanced Reverse Engineering |
CSC 846 |
Advanced Malware Analysis |
CSC 848 |
Advanced Software Exploitation |
Applicant requirements
Applicants must hold a master’s degree in computer science or a related field with two years of experience in software reverse engineering, malware analysis, or binary exploitation.
Learning outcomes
- Analyze unknown binaries using reverse engineering to identify their behavior and purpose.
- Evaluate potential mitigations for potential cyber-attacks in diverse settings.
- Create shell code using software exploitation techniques, including but not limited to, heap and RP exploitation.