DevOps Curriculum
BAS in Applied Computing
Journey to a bachelor's as an Arizona Wildcat
Emphasis Area Courses
Required for students in the DevOps emphasis.
CYBV 302 - Linux Security Essentials
CYBV 302 provides students with an in-depth analysis of Linux and Unix security issues. This includes configuration guidance using industry standards and benchmarks and implementation through practical, real-world examples. The course will examine how to mitigate or eliminate general problems that apply to Nix like OSs, including vulnerabilities in passwords and password authentication systems, virtual memory system, and applications most commonly run. Students will develop scripting skills through this course to progressively build more complex tools and automate security.
Through an operational lens, students will use the command line and system tools to analyze their systems to determine what vulnerabilities exist. From an initial baseline, students will progressively harden their systems through built-in tools and use scripting to implement and automate security controls. After each week, students will analyze their current system status, identify current vulnerabilities, and recommend mitigation strategies and compensating controls needed to reduce residual risk. Finally, students will review their final system configuration from a comprehensive point of view to determine what vulnerabilities remain and research and identify ways in which attackers can attack the hardened system.
CYBV 303 - Windows Security Essentials
CYBV 303 provides students with the foundational knowledge of the Windows Operating System and securing Windows environments including; learning PowerShell scripting, host hardening and active directory scripting, smart tokens and Public Key Infrastructure (PKI), protecting admin credentials, and thwarting hackers inside the network. Students will use hands-on labs and exercises to secure Windows systems, networks, applications, and data. Students will develop scripting skills through this course to progressively build more complex tools and automate security.
Through an operational lens, students will use the PowerShell, Windows Command-Line, and system tools to analyze their systems to determine what vulnerabilities exist. From an initial baseline, students will progressively harden their systems through built-in tools and use scripting to implement and automate security controls. After each week, students will analyze their current system status, identify current vulnerabilities, and recommend mitigation strategies and compensating controls needed to reduce residual risk. Finally, students will review their final system configuration from a comprehensive point of view to determine what vulnerabilities remain and research and identify ways in which attackers can attack the hardened system.
APCV 360 - Database Management Fundamentals
APCV 360 provides an introduction to database management concepts including definitions of data elements, basic data structures, data modeling, and systems architectures. Topics also cover some of the leading database management products and design tools currently in use.
NETV 378 - System Administration
NETV 378 covers the theory and application of system administration from a UNIX and Windows perspective, including installation, management, optimization, and security. Case studies of industry examples are used as applications to reinforce the discussed theories.
NETV 382 - Network Defense, Incident Response & Disaster Recovery
NETV 382 provides network defenders with the skills to respond quickly to incidents and recover critical data in the event of a disaster. Students will learn the Active Cyber Defense Cycle (ACDC) and apply the concepts of cyber intelligence and network security monitoring towards the response and defense of networks.
NETV 379 - Cloud Computing
NETV 379 covers the theory and application of cloud computing, including Cloud Computing network design and connectivity, server management, best-practices, security, and provider service level agreements. Case studies of industry examples are used as applications to reinforce the discussed theories.