Cyber Science Major

Cyber Science Major

Cyber Science

Major

The cyber science major offers five different tracks from which cadets can choose. The interdisciplinary curriculum across all tracks includes the study of data, software, hardware, connection, human, organizational, and societal factors that affect secure computer systems in cyberspace.

Offered by the Department of Electrical Engineering and Computer Science.

The Cyber Science major is based on the Cybersecurity Curricula 2017 (CSEC2017) - Curriculum Guidelines for Post-Secondary Degree Programs in Cybersecurity, published by a joint task force from the Association for Computing Machinery (ACM), Institute of Electrical and Electronics Engineers (IEEE), and other professional societies. The interdisciplinary curriculum studies the data, software, hardware, connection, human, organizational, and societal factors that affect secure computer systems in cyberspace. The major was first offered to the Class of 2023 and had its first graduates in the Class of 2021.

The Cyber Science major is not intended to prepare cadets for commissioning in the cyber branch exclusively. The different concentrations offered by the major range from highly interdisciplinary to deeply technical and will prepare cadets to successfully commission into any branch.

If you are a cadet who is interested in any of the Cyber Science concentrations, contact any member of the Department of Electrical Engineering and Computer Science to be directed to an academic counselor.

This major offers an honors track.

Concentrations

The Cyber Science major consists of 11 foundational courses and 5 concentrations. This interdisciplinary curriculum studies the data, software, hardware, connection, human, organizational, and societal factors that affect secure computer systems in cyberspace. The different concentrations offered by the major range from highly interdisciplinary to deeply technical and will prepare cadets to successfully commission into any branch. 

  • Cybersecurity Concentration: The Cybersecurity concentration focuses on the interdisciplinary study of people, processes, and technology to assure operations in the face of cyberspace risks.
  • Network Services Concentration: A course of study similar to a traditional information technology major focused on building and securing the networks and services fundamental to operating in cyberspace.
  • Cyber Operations Concentration: A program of study that explores the low-level technical skills that enable offensive and defensive operations.
  • Cyber-Physical Systems Concentration: A course of study that uniquely combines deep exploration of both hardware and software to exploit networked, physical systems that are controlled by algorithms.
  • Machine Learning Concentration: A program of study that prepares cadets to gain insight using algorithmic tools that exploit large datasets and the Internet of Things.

Interested Cadets

The Cyber Science major consists of 11 foundational courses and 6 optional courses. It also offers an honors track.

Required Courses

Cyber Foundations

  • CS380 - COMPUTER SYSTEMS & ORGANIZATN
  • CS384 - DATA STRUCTURES
  • CS400 - PRO CONSIDERATIONS IN COMPUTING
  • CY300 - PROGRAMMING FUNDAMENTALS
  • CY350 - NETWORK ENGR & MGT
  • CY460 - CYBER POLICY, STRATEGY, & OPNS
  • CY465 - ORGANIZATIONAL SECURITY

Cyber Operations Electives

Choose 1 

  • CY392 – DEFENSIVE CYBER OPERATIONS
  • CY482 - OFFENSIVE CYBER OPERATIONS

Cyber Electives

Choose 4 from 21 courses

Complementary.  Support Courses (Cyber Foundation)

  • EE360 – DIGITAL LOGIC W/ EMBEDDED SYS
  • MA372 - INTRODUCTION TO DISCRETE MATH

Complementary Support Course (Cyber in Society Elective)
The interactions of the cyber domain in society and the military are a critical part of understanding the impacts of cyber. 

Choose 1 of 3.

  • LW462 - CYBER LAW
  • PY326 - ETHICS OF TECHNOLOGY
  • WS485 - JOINT AND MULTINATIONAL OPS

Integrative Experience for the Major

  • XE401 - INTEGRATIVE SYSTEM DESIGN I
  • XE402 - INTEGRATIVE SYSTEM DESIGN II

Curriculum Requirements

This section describes how cadets in this major satisfy various curriculum requirements.

Science Depth
Cadets may take any Academy-approved science depth choice.

  • CH102 - GENERAL CHEMISTRY II
  • CH275 - BIOLOGY
  • PH202 - PHYSICS II
  • PH252 - ADVANCED PHYSICS II
  • PH275 - PHYSICS II: SPACE

STEM Depth

This course also satisfies the IT/Cyber requirement by successfully completing the IT/CYBER content in the core curriculum and CY355.

  • CY355 - CYBER FOUNDATIONS – COMPUTING

Core Engineering Sequence

Cadets in this major will satisfy the core engineering requirement with the embedded CYBER Sequence courses.

Writing in the Major

Cadets in this major satisfy the West Point Writing Program requirement by successfully completing writing requirements in the core curriculum and CS400.

Learn More

Cadets in this major will have the opportunity to participate in a number of honor societies and summer internships as part of the Academic Individual Advanced Development (AIAD) program.

Opportunities to explore the depth and breadth of cyber abound within the Cyber Science program and EECS. Research and extracurriculars are primarily supported through the Cyber Research Center and include a myriad research opportunities.

Honor Societies:

To learn more about enrichment for this major, visit the Department of Electrical Engineering and Computer Science.

The Bachelor of Science (B.S.) in Cyber Science at the United States Military Academy is accredited by the Computing Accreditation Commission of ABET, http://www.abet.org, under the General Criteria and the Cybersecurity and Similarly Named Computing Programs Criteria.

Program Educational Objectives

Five to seven years after graduation, cadets who major in Cyber Science will have been successful Army officers who have:​

  • Initiated and completed tasks that identify aspects of a complex situation that can be enhanced by using computing technology.
  • Applied computing knowledge and security principles and practices individually or in diverse teams to maintain operations in the presence of risks and threats.
  • Used effective communication to explain new computing technology to war fighters in support of current and emerging Army war fighting doctrine.
  • Grown professionally through self-study, continuing education, and professional development.

Student Outcomes

At the time of graduation, graduates of the program will have the ability to:

  • Analyze a complex computing problem and apply principles of computing and other relevant disciplines to identify solutions.
  • Design, implement, and evaluate a computing-based solution to meet a given set of computing requirements in the context of Cyber Science.
  • Communicate effectively in a variety of professional contexts.
  • Recognize professional responsibilities and make informed judgments in computing practice based on legal and ethical principles.
  • Function effectively as a member or leader of a team engaged in activities appropriate to Cyber Science.
  • Apply security principles and practices to maintain operations in the presence of risks and threats.