“”

B.S., Cybersecurity Analytics and Operations

Identify. Analyze. Defend. Respond.

There are hundreds of millions of attempted cyberattacks each year, costing people and organizations trillions of dollars. The B.S., Cybersecurity Analytics and Operations program positions you to leverage the cyber technical and risk management skills needed to evaluate risk and defend against these attacks. By understanding how adversaries think and deploying cutting-edge cyber defense techniques, you'll protect information systems, discover vulnerabilities, manage network security devices, analyze data, and communicate the risks and impacts of cyberattacks to stakeholders.

Is Cybersecurity Analytics and Operations Right for Me?

Cybersecurity Analytics and Operations combines technology with math, law and policy, programming, psychology, criminology and business to protect critical systems. This program could be a great fit if you want to

  • protect digital information, data stores, and computer networks from threats
  • learn how we can keep sensitive information out of the hands of hackers, cybercriminals, and terrorist organizations
  • work on a team to solve technical problems for organizations

Help Me Find My Major

What You'll Study

Gain foundational knowledge and state-of-the-art skills needed to anticipate and defend against computer attacks by exploring topics like these.

  • Incident Handling and Response
  • Cyber Forensics
  • Cyber Technologies Studio
  • Malware Analytics
  • Network Security
  • Risk Management
  • Information Security Management
  • Decision Theory and Analysis

Suggested Academic Plan

Application Focus Areas

Pick an application focus area or work with an adviser to create your own so you can develop and apply more specialized knowledge in a specific field.

  • Application development
  • Economics
  • Enterprise technology
  • Entrepreneurship and Business of Technology
  • Geopolitics
  • Health care
  • Law and policy
  • Custom Application Focus

Application Focus Areas

Earn a B.S. and M.S. at the Same Time

You can pursue a B.S. in Cybersecurity Analytics and Operations and a master's degree at the same time through the Integrated Undergraduate-Graduate (IUG) degree program. IUGs make it possible to complete both an undergraduate and graduate degree in five years!

Cyberwar concept image.

The Power of Internships

Every Cybersecurity Analytics and Operations student must complete at least one internship before graduating—most complete more than one, and 84% receive a job offer from an internship provider. With hundreds of organizations recruiting and a dedicated Career Solutions team to support you, you'll have the tools and opportunities to launch your career.

View Past Internships
Photo of Brianna Malcolmson

"Knowing the fundamentals of risk analysis and security theory has given me an advantage in the cybersecurity industry because I can speak knowledgeably from a theoretical standpoint when implementing practical solutions. It's also been fun to lead industry groups and shape the direction of corporate red teaming as people explore the differences between traditional IT shops and the big tech startup world and to help educate people on ways to adapt."

Brianna Malcolmson '11 , Information Security Specialist, Diocese of Lismore Catholic Schools

Discover Your Career

Technology is ever-changing, and so are the careers that create, use, and study it. As you work toward your degree, you’ll identify and refine your career interests through courses, student organizations, and experiential opportunities. With guidance and resources from our dedicated Career Solutions team—from your first job to the executive suite—you'll gain the technical expertise, business savvy, and communication skills to lead in business, health care, defense, technology, and countless other industries.

Penetration Tester/Ethical Hacker

Probes and exploits security vulnerabilities in web applications, networks, and systems using penetration tools to simulate cyberattacks, helping organizations improve their security.

Computer Programmer/Analyst

Writes and tests code to ensure applications and software function properly, converting program designs into executable instructions for computers.

Client Security Inquiry Specialist

Provides solutions to guard against emerging threats, identifies malware, assesses security vulnerabilities, configures client security settings, and prioritizes issues through reports and alerts.

Information and Cybersecurity Analyst/System Security

Designs and implements security measures to protect computer systems, networks, and data from attacks.

Enterprise Risk and Security Solutions Analyst

Identifies, assesses, and manages risks, protecting the enterprise’s resources, products, services, and external impacts on society and markets.

Computer Forensics Specialist

Assists law enforcement in cyber crimes by evaluating attacks, collecting evidence, and extracting data to identify the attack type, perpetrator, and stolen information.

IT Analyst

Analyzes and transmits specialized information, including acquiring, analyzing, indexing, and preparing abstracts. Manages technical information services, technology assessment, research support, and engineering services.

Security Engineer

Focuses on designing systems to handle disruptions, from natural disasters to malicious acts, ensuring engineering solutions meet requirements while preventing misuse through security policies.

Technical Risk Advisor

Scopes and monitors technology risks, performs assessments, oversees control testing, supports remediation, and provides technical guidance to improve and implement effective technology controls.

The Competitive Cyber Security Organization poses for a photo at an event.

Competitive Cyber Security Organization

Through undergraduate research, experiential learning opportunities, and student organizations like the Competitive Cyber Security Organization, Cybersecurity Analytics and Operations students can extend learning far beyond the classroom. CCSO help helps students build their cyberdefense skills by participating in a variety of cybersecurity events throughout the year, where they compete against university teams from around the world in real-world challenges.

Learn about CCSO