Cyber Operations Concentration

Cybersecurity, Bachelor of Science in Cybersecurity - Cyber Operations Requirements

The University of Nebraska at Omaha's undergraduate Cybersecurity degree program is one of the few National Security Agency (NSA) certified National Centers of Academic Excellence in Cyber Operations (CAE-CO).  The Cyber Operations concentration within the BS in Cybersecurity satisfies requirements defined by the NSA CAE-CO program, and students who complete this concentration will earn a special transcript designation indicating that they have met NSA CAE-CO's requirements upon graduation.

General Education Requirements - 34 Hours Required
Minimum of “C-“required
Fundamental Skills 15
Writing – 6 hrs.
ENGLISH COMPOSITION I
COLLEGE RESEARCH AND INFORMATION LITERACY
Oral Communication – 3 hrs.
PUBLIC SPEAKING FUNDS
ARGUMENTATION AND DEBATE
Quantitative Literacy – 3 hrs.
INTRODUCTION TO MATHEMATICAL AND COMPUTATIONAL THINKING
QUANTITATIVE LITERACY
QUANTITATIVE REASONING FOR HEALTHCARE PROFESSIONALS
COLLEGE ALGEBRA WITH SUPPORT
Data Literacy – 3 hrs.
Select one from the following:
DATA LITERACY AND VISUALIZATION
ELEMENTARY STATISTICS
Until Fall 2028, students can satisfy this requirement with an approved data literacy course, or any approved natural or social science general education course.
Breadth of Knowledge13
Social Science – 3 hrs.
Humanities – 3 hrs.
Natural & Physical Science (must complete a lab) – 4 hrs.
Arts – 3 hrs.
Individual and Social Responsibility 6
Cultural Knowledge – 3 hrs.
Civic Knowledge and Engagement – 3 hrs.
MAJOR REQUIREMENTS - 71 Hours Required
**Course will satisfy UNO's General Education Requirement
^Course requires pre-requisite(s)
All of the Following53
INTRODUCTION TO INFORMATION SECURITY (**)
INTRODUCTION TO COMPUTER SCIENCE I (^)
INTRODUCTION TO COMPUTER SCIENCE II (^)
CALCULUS I (^)
DATA ANALYSIS AND MACHINE LEARNING (^)
MATHEMATICAL FOUNDATIONS OF COMPUTER SCIENCE (^)
DISCRETE MATHEMATICS
LOW-LEVEL PROGRAMMING (^)
SYSTEM ADMINISTRATION (^)
PRINCIPLES OF CYBER OPERATIONS AND DEFENSE (^) 1
INFORMATION TECHNOLOGY ETHICS (** ^)
DATA STRUCTURES (^)
COMMUNICATION NETWORKS (^)
CRYPTOGRAPHY (^)
CYBERSECURITY POLICY AND AWARENESS (^)
COMPUTER ORGANIZATION (^)
OPERATING SYSTEMS (^)
CAPSTONE (^)
Cyber Operations Concentration Requirements - Complete all of the following18
THEORY OF COMPUTATION (^)
ETHICAL HACKING - MALWARE ANALYSIS (^)
ETHICAL HACKING - NETWORK ANALYSIS (^)
COMPUTER ARCHITECTURE (^)
DIGITAL FORENSICS (^)
MOBILE DEVICE FORENSICS (^)
ELECTIVES
 Elective hours as required to reach a total of 120 hours
1

Students who have previously earned credit for CYBR 4360 may substitute CYBR 4360 and PSCI 4260 in place of CYBR 3050.