Curriculum

DevOps Curriculum

BAS in Applied Computing

Journey to a bachelor's as an Arizona Wildcat

Emphasis Area Courses

Required for students in the DevOps emphasis.

CYBV 302 - Linux Security Essentials

CYBV 302 provides students with an in-depth analysis of Linux and Unix security issues. This includes configuration guidance using industry standards and benchmarks and implementation through practical, real-world examples. The course will examine how to mitigate or eliminate general problems that apply to Nix like OSs, including vulnerabilities in passwords and password authentication systems, virtual memory system, and applications most commonly run. Students will develop scripting skills through this course to progressively build more complex tools and automate security.

Through an operational lens, students will use the command line and system tools to analyze their systems to determine what vulnerabilities exist. From an initial baseline, students will progressively harden their systems through built-in tools and use scripting to implement and automate security controls. After each week, students will analyze their current system status, identify current vulnerabilities, and recommend mitigation strategies and compensating controls needed to reduce residual risk. Finally, students will review their final system configuration from a comprehensive point of view to determine what vulnerabilities remain and research and identify ways in which attackers can attack the hardened system.

CYBV 303 - Windows Security Essentials

CYBV 303 provides students with the foundational knowledge of the Windows Operating System and securing Windows environments including; learning PowerShell scripting, host hardening and active directory scripting, smart tokens and Public Key Infrastructure (PKI), protecting admin credentials, and thwarting hackers inside the network. Students will use hands-on labs and exercises to secure Windows systems, networks, applications, and data. Students will develop scripting skills through this course to progressively build more complex tools and automate security.

Through an operational lens, students will use the PowerShell, Windows Command-Line, and system tools to analyze their systems to determine what vulnerabilities exist. From an initial baseline, students will progressively harden their systems through built-in tools and use scripting to implement and automate security controls. After each week, students will analyze their current system status, identify current vulnerabilities, and recommend mitigation strategies and compensating controls needed to reduce residual risk. Finally, students will review their final system configuration from a comprehensive point of view to determine what vulnerabilities remain and research and identify ways in which attackers can attack the hardened system.

APCV 360 - Database Management Fundamentals

APCV 360 provides an introduction to database management concepts including definitions of data elements, basic data structures, data modeling, and systems architectures. Topics also cover some of the leading database management products and design tools currently in use.

NETV 378 - System Administration

NETV 378 covers the theory and application of system administration from a UNIX and Windows perspective, including installation, management, optimization, and security. Case studies of industry examples are used as applications to reinforce the discussed theories.

NETV 382 - Network Defense, Incident Response & Disaster Recovery

NETV 382 provides network defenders with the skills to respond quickly to incidents and recover critical data in the event of a disaster. Students will learn the Active Cyber Defense Cycle (ACDC) and apply the concepts of cyber intelligence and network security monitoring towards the response and defense of networks.

NETV 379 - Cloud Computing

NETV 379 covers the theory and application of cloud computing, including Cloud Computing network design and connectivity, server management, best-practices, security, and provider service level agreements. Case studies of industry examples are used as applications to reinforce the discussed theories.

Core Courses

Completed by all BAS in Applied Computing students.

Back to top

ENGV 306 - Advanced Composition

ENGV 306 focuses on the study of genre and rhetorical situation and advanced practice in expository writing.

CYBV 329 - Cyber Ethics

CYBV 329 is a sustained study of ethical issues that arise in relation to employment in the public and private sectors, including allocation of resources, corporate and social responsibility, relationships, and discrimination. This course is a designated writing emphasis course. The main focus of this course will be on the ethical and legal standards governing information technology. New technology creates ethical challenges for individuals around the globe and applies to most persons regardless of whether they are employed in the information technology field or a more traditional occupation.

APCV 302 - Statistics in the Information Age

APCV 302 provides an introduction to descriptive and inferential statistics. It also presents an introduction to data complexity, uncertainty and variation in information age and discusses techniques for interpreting the data.

CYBV 326 - Introductory Methods of Network Analysis

CYBV 326 provides a methodology for analyzing networks by examining the network at its infrastructure, network, and applications layers; exploring how they transfer data; investigating how network protocols work to enable communication; and probing and analyzing how the lower-level network layers support the upper ones. Students will use hands-on labs and exercises to investigate and analyze network fundamentals.

APCV 320 - Computational Thinking and Doing

APCV 320 provides an overview of basics of programming and techniques used by computing professionals in a variety of application areas. Topics include computation, programs, algorithms, programming languages, and complexity, as well as how these concepts and techniques are used to solve problems in computing.

CYBV 301 - Fundamentals of Cyber Security

CYBV 301 will provide students with an introduction to Fundamentals of Cybersecurity, which will include an introduction to cyber security policy, doctrine, and operational constraints.  A broad survey of cybersecurity concepts, tools, technologies and best practices will be presented. Students will use hands-on activities to become familiar with and practice cybersecurity techniques and procedures.

APCV 310 - Introduction to Computing

APCV 310 introduces students to computing concepts in hardware, software, networking, data processing, and other emerging technologies. Topics cover information representation, relational databases, system design, web development, and cutting edge technologies for CPU, operating systems, and networks.

APCV 498 - Senior Capstone

APCV 498 is a culminating experience for majors involving a substantive project that demonstrates a synthesis of learning accumulated in the major, including broadly comprehensive knowledge of the discipline and its methodologies.