Dakota State University students walking around campus

Preparation + opportunity = success

That's the DSU equation. We're a four-year university with nationally recognized programs, cutting-edge facilities, and the brightest thinkers. But we're also a tight-knit, inclusive community. Small class sizes mean hands-on training and individualized attention. All this with an affordable, public school price that's among the best values in the region.

Majors & Degrees

Cyber Operations Graduate Certificate

Specialize in Cyber Operations

Credits

15

Start Terms

Fall

|

Spring

|

Summer

Available

Online

Tuition

$3,365.10

estimated per semester

More tuition details

Dakota State University’s Graduate Certificate in Cyber Operations provides working professionals with essential knowledge of technical cyber operations including a deep dive into software reverse engineering, binary exploitation, and malware analysis. Students will be equipped with the skills needed to analyze and apply technical cyber security concepts to protect modern systems.

Meet the demand for cybersecurity professionals, which is projected to grow by 33% by 2033 in the U.S. according to the U.S. Bureau of Labor Statistics. The program builds on your knowledge gained from a master’s degree and work experience, allowing you to upskill your expertise without the full requirements of a Ph.D.

Prepare for the future

This certificate is specifically designed for technical cyber security professionals. DSU’s graduate programs are recognized for their high degree of practical application and hands-on curriculum with a deep theoretical foundation. Advance your technical skills with five core courses from the Ph.D. in Cyber Operations degree.

After completion of the certificate, students who wish to pursue the Ph.D. will submit a full application and, if admitted, can apply the 15 credits toward their doctoral degree.

Courses

CSC 840

Cyber Operations I

CSC 841

Cyber Operations II

CSC 844

Advanced Reverse Engineering

CSC 846

Advanced Malware Analysis

CSC 848

Advanced Software Exploitation

Applicant requirements

Applicants must hold a master’s degree in computer science or a related field with two years of experience in software reverse engineering, malware analysis, or binary exploitation.

Apply

Learning outcomes

  • Analyze unknown binaries using reverse engineering to identify their behavior and purpose.
  • Evaluate potential mitigations for potential cyber-attacks in diverse settings.
  • Create shell code using software exploitation techniques, including but not limited to, heap and RP exploitation.

Related Programs