Skip to main content

Master of Science in Cyber Operations and Resilience Degree Plan

Plan Your Future

The Master of Science in Cyber Operations and Resilience is offered online only with no in-person requirements. You can complete the cyber master’s degree in as few as four semesters.

Content on this page is provided as a quick reference for planning your academic schedule. All official course descriptions and degree requirements are published on the graduate catalog site.

Start From Any Background

You can enroll in the Master of Science in Cyber Operations and Resilience with any background. However, certain courses do incorporate elements of cyber, IT or programming basics. While you are learning the basics, our advisors will help you choose the courses where you will be most successful. You can enroll in some courses while learning the basics.

Practice what you have learned in your classes and gain hands-on experience with the program’s online Cyber Operations and Resilience Learning Lab. Here, you will gain experience with the information technology and cybersecurity tools, techniques and processes that are used in the cyber industry. No prior background knowledge is required.

Free Training Opportunities

If you are interested in pathways that require additional background knowledge, Boise State’s program has established partnerships that offer free training to help you prepare:

  • Cisco Networking Academy’s Python Essential 1 course: a self-paced, online option to learn Python programming
  • VMware: self-paced learning and VMware software to learn about virtualization computing
  • Palo Alto Academy’s Networking Fundamentals courses: self-paced, online options focused on networking
  • Cisco Network Academy’s Networking Essentials course: self-paced, online options focused on networking

Classes and Scheduling Options

Course Descriptions

Required Courses

CORE 500 Cyber Systems Thinking

An introduction to systems thinking, lateral thinking and resilience thinking as they relate to cybersecurity. Topics include understanding the complexity/interconnectedness of cybersecurity, applying lateral thinking in solving cyber problems, interacting among people, processes and technologies, and managing disturbances/surprises/uncertainty to be more resilient.

CORE 501 Cyber Risk Assessment

A study of risk assessment and management techniques, methods and models used in industry to minimize, control and communicate risks, including NIST and OWASP.

Cyber Courses and Cyber Electives

CORE 503 Information Assurance

An introduction to the practice of using people, process, technology and metrics to assure security of information and risk management.

CORE 506 Cybersecurity Risk Quantification

An introduction to the use of probabilistic methods for quantifying cyber risk. Includes Bayesian and Monte Carlo methods, an introduction to the risk analysis process and hands-on work with mathematical models and vulnerability analysis.

CORE 510 Applied Cybersecurity Programming

An introduction to Python and Powershell and how these can be used to simplify cyber related tasks.

CORE 511 Artificial Intelligence and Machine Learning

An overview of how machine learning and artificial intelligence can be applied to cybersecurity.

CORE 512 Introduction to Deep Learning in Cybersecurity

An introduction to deep learning algorithms and how to design deep learning for cyber security.

CORE 513 Internet of Things Architecture

An introduction to embedded systems, basic concepts of IoT and making smart things. This covers IoT architecture including sensor, hardware, firmware, internet connection and data mining.

CORE 514 Cyber Informed Engineering

An overview of how to embed cyber security in systems design.

CORE 520 Cyber Security Operations Center

An overview of centralized security functions where people, processes and technology are employed to continuously monitor and improve an organization’s security posture while preventing, detecting, analyzing and responding to cybersecurity incidents.

CORE 521 Cyber Business and Regulatory Operations

An introduction to existing regulations that companies and organizations must follow to safeguard information and systems.

CORE 522 Cyber Red and Blue Teams

A study of how to think like a blue team and how to think like a red team.

CORE 540 Zero Trust Architecture

A study of practical cybersecurity architecture and zero trust architecture. Topics include, creating a security architecture, what is and what is not zero trust architecture, building relevant views to a zero trust architecture (including network, user, data and attacker views), when and where zero trust architecture can be broken, and what zero trust can strengthen. This course takes a practical view of security architecture and zero architecture issues that can be applied in any environment.

CORE 550 Cyber Threat Intelligence

A study and experimentation of platforms, open source tools and techniques for cyber threat intelligence. The connection between cyber threat intelligence and risk assessment. Advanced practicum in artificial intelligence applications in cyber threat intelligence.

CORE 551 Cyber Warfare and Conflicts

An examination of cyber warfare and conflicts. An international issue that spans across nation-state borders and how it impacts cyber and physical infrastructure interdependencies.

CORE 552 Cyber Digital and Signal Intelligence

A study of cryptographic mechanisms and cryptographic threat assessments to critical information infrastructures. Topics include the advances in electronics hardware, software, network and quantum computing. Side channel attacks and signal intelligence/collection.

CORE 554 Digital Forensic and eDiscovery Procedures

Preservation and collection of digital evidence using key principles and methodologies. Develops the understanding of eDiscovery principles, laws and best practices.

CORE 560 Cyber Resilience Systems Design

A study of resilient systems, networks and infrastructure design on the ability to anticipate, withstand, recover from and adapt to adverse conditions, stresses, attacks or compromises.

CORE 561 Network Design and Exploitation Techniques

A study of information technology and industrial networking exploitation. An examination of advances in network attacks and exploitation techniques. Analyze the layers of design to increase infrastructure interconnection network resiliency.

CORE 562 Resilience Coding and Architecture of Devices

A study and application of how low-level hardware and software can be exploited and defended. The architecture of devices and systems for resiliency. The use of secure coding and defense against counterfeiting devices.

CORE 563 Cyber Operations Challenge and Competition

Provides a practical, hands-on approach to mastering IT and cybersecurity problem-solving, complemented by active participation in cybersecurity competitions for practical application and skill development.

CORE 570 Cyber Risk Management

An overview of cyber security risk management frameworks and practices. Students will model cybersecurity risks and apply both qualitative and quantitative risk assessment methods.

CORE 571 Cyberlaw, Ethics and Policy

An examination of laws, regulations, ethics, policy and executive orders for data protection and privacy. Topics include national security issues, ethics, data protection, digital forensics, physical evidence, incident response and event administration and management.

CORE 572 Cybersecurity Governance and Compliance

A study and application of organization cyber governance, risk and compliance management in cyberspace. Learners will look into the business context of key stakeholders, corporate culture and organization risks. Industry standards and frameworks will be used.

CORE 573 Developing and Adapting Cybersecurity Policies and Procedures

Gain the expertise required to create and refine effective security policies for organizations of all sizes. Explore the dynamic landscape of cybersecurity and learn how to craft policies that adapt to evolving threats and compliance requirements, ensuring robust protection for digital assets.

Culminating Activity Courses

CORE 577 Applied Research

Execution of a substantial exercise that demonstrates the ability to successfully and independently carry out a professional activity similar to what is encountered in the professional workplace; archival of the results of the research is required according to standards approved by the Graduate College.

CORE 578 Teaching

One semester/one course of teaching in the area of cyber and physical resilience teaching at regional community college or university.

CORE 579 Certification

Obtain one industry certification. May be repeated once for credit.

Authorization

Boise State maintains authorization to offer online programs in Idaho and beyond. Detailed information about state authorization is available on the eCampus Center website.

Didn’t find what you’re looking for?

Contact our enrollment and student success team for support by emailing us at cybergrad@boisestate.edu, calling (208) 426-5921 or clicking the chat button.

Chat