Cyber Science Major

Cyber Science Major

Cyber Science

Major

The cyber science major offers five different tracks from which cadets can choose. The interdisciplinary curriculum across all tracks includes the study of data, software, hardware, connection, human, organizational, and societal factors that affect secure computer systems in cyberspace.

Offered by the Department of Electrical Engineering and Computer Science.

The Cyber Science major is based on the Cybersecurity Curricula 2017 (CSEC2017) - Curriculum Guidelines for Post-Secondary Degree Programs in Cybersecurity published by a joint task force from the Association for Computing Machinery (ACM), Institute of Electrical and Electronics Engineers (IEEE), and other professional societies. The interdisciplinary curriculum studies the data, software, hardware, connection, human, organizational, and societal factors that affect secure computer systems in Cyberspace. The major was first offered to the Class of 2023 and had its first graduates in the Class of 2021.

The Cyber Science major is not intended to prepare cadets for commissioning in the Cyber branch exclusively. The different concentrations offered by the major range from highly interdisciplinary to deeply technical and will prepare cadets to successfully commission into any branch.

If you are a cadet who is interested in any of the Cyber Science concentrations, contact any member of the Department of Electrical Engineering and Computer Science to be directed to an academic counselor.

This major offers an honors track.

Concentrations

The Cyber Science major consists of 11 foundational courses and 5 concentrations. This interdisciplinary curriculum studies the data, software, hardware, connection, human, organizational, and societal factors that affect secure computer systems in Cyberspace. The Cyber Science major is not intended to prepare cadets for commissioning in the Cyber branch exclusively. The different concentrations offered by the major range from highly interdisciplinary to deeply technical and will prepare cadets to successfully commission into any branch. 

  • Cybersecurity Concentration: The Cybersecurity concentration focuses on the interdisciplinary study of people, processes, and technology to assure operations in the face of cyberspace risks. 
  • Network Services Concentration: A course of study similar to a traditional information technology major focused on building and securing the networks and services fundamental to operating in cyberspace. 
  • Cyber Operations Concentration: A program of study that explores the low-level technical skills that enable offensive and defensive operations. 
  • Cyber-Physical Systems Concentration: A course of study that uniquely combines deep exploration of both hardware and software to exploit networked, physical systems that are controlled by algorithms. 
  • Machine Learning Concentration: A program of study that prepares cadets to gain insight using algorithmic tools that exploit large datasets and the internet of things.

Learn more about our first-rate computing laboratory research facilities.

To learn more about this area of study, visit the Department of Electrical Engineering and Computer Science.

Required Courses for the Major (all concentrations)

  • CS380 COMPUTER ORGANIZATION
  • CS384 DATA STRUCTURES
  • CS400 PRO CONSIDERATIONS IN COMPUTING
  • CY300 PROGRAMMING FUNDAMENTALS
  • CY350 NETWORK ENGR & MGT
  • CY355 CYBER FOUNDATIONS - COMPUTING
  • CY450 CYBER SECURITY ENGINEERING
  • EE360 DIGITAL LOGIC W/ EMBEDDED SYS 
  • MA372 INTRODUCTION TO DISCRETE MATH
  • XE401 INTEGRATIVE SYSTEM DESIGN I 
  • XE402 INTEGRATIVE SYSTEM DESIGN II

 

 Required Courses for Cyber Operations Concentration

  • CS403 SOFTWARE TESTING & DEVELOPMENT
  • CS481 OPERATING SYSTEMS
  • EE487 EMBEDDED SYSTEMS DEVELOPMENT
  • MA464 APPLIED ALGEBRA W/ CRYPTOLOGY
  • CS483 DIGITAL FORENSICS
  • CS484 COMPUTER NETWORKS
  • CY385 CYBER ALGORITHMIC FOUNDATIONS
  • CY460 CYBER POLICY, STRATEGY, & OPNS

To learn more, view the full Cyber Science: Cyber Operations Major Curriculum.

 

 Required Courses for Cybersecurity Concentration

  • CY383 SECURE INTERFACE DESIGN 
  • CY394 CLOUD COMPUTING
  • CY460 CYBER POLICY, STRATEGY, & OPNS
  • CY465 ORGANIZATIONAL SECURITY

Sample Electives

  • CS384 DATA STRUCTURES
  • CS393 DATABASE SYSTEMS
  • CY385 CYBER ALGORITHMIC FOUNDATIONS
  • EE487 EMBEDDED SYSTEMS DEVELOPMENT 
  • LW462 CYBER LAW
  • MA394 FUNDAMENTALS/NETWORK SCIENCE
  • MA464 APPLIED ALGEBRA W/ CRYPTOLOGY
  • PY326 CYBER ETHICS 
  • XH341 INTEL CYBER HISTORY

To learn more, view the full Cyber Science: Cybersecurity Major Curriculum.

 

 Required Courses for Network Services Concentration

  • CY383 SECURE INTERFACE DESIGN 
  • CY394 CLOUD COMPUTING
  • CY460 CYBER POLICY, STRATEGY, & OPNS
  • CS393 DATABASE SYSTEMS 
  • CS484 COMPUTER NETWORKS
  • CY392 NETWORK SERVICES MANAGEMENT

Sample Electives

  • CY385 CYBER ALGORITHMIC FOUNDATIONS
  • CY460 CYBER POLICY, STRATEGY, & OPNS
  • CY465 ORGANIZATIONAL SECURITY 
  • LW462 CYBER LAW 
  • PY326 CYBER ETHICS 
  • XH341 INTEL CYBER HISTORY

To learn more, view the full Cyber Science: Network Services Major Curriculum.

 

 Required Courses for Machine Learning Concentration

  • CS403 SOFTWARE TESTING & DEVELOPMENT
  • CS481 OPERATING SYSTEMS
  • EE487 EMBEDDED SYSTEMS DEVELOPMENT
  • MA464 APPLIED ALGEBRA W/ CRYPTOLOGY
  • CS486 ARTIFICIAL INTELLIGENCE 
  • MA477 THEORY & APPL OF DATA SCIENCE 
  • MA376 APPLIED STATISTICS

Sample Electives

  • CY385 CYBER ALGORITHMIC FOUNDATIONS
  • CY460 CYBER POLICY, STRATEGY, & OPNS
  • CY465 ORGANIZATIONAL SECURITY 
  • LW462 CYBER LAW 
  • PY326 CYBER ETHICS 
  • XH341 INTEL CYBER HISTORY

To learn more, view the full Cyber Science: Machine Learning Major Curriculum.

 

 Required Courses for Cyber-Physical Systems Concentration

  • CS403 SOFTWARE TESTING & DEVELOPMENT
  • CS481 OPERATING SYSTEMS
  • EE487 EMBEDDED SYSTEMS DEVELOPMENT
  • MA464 APPLIED ALGEBRA W/ CRYPTOLOGY
  • EE302 INTRO ELECTRICAL ENGIN 
  • XE472 DYNAMIC MODELING AND CONTROL 
  • MA205 CALCULUS II

Sample Electives

  • CY385 CYBER ALGORITHMIC FOUNDATIONS
  • CY460 CYBER POLICY, STRATEGY, & OPNS
  • CY465 ORGANIZATIONAL SECURITY 
  • LW462 CYBER LAW 
  • PY326 CYBER ETHICS 
  • XH341 INTEL CYBER HISTORY

To learn more, view the full Cyber Science: Cyber-Physical Systems Major Curriculum.

Cadets in this major will have the opportunity to participate in a number of academic clubs, honor societies, and summer internships as part of the Academic Individual Advanced Development (AIAD) program.

Opportunities to explore the depth and breadth of cyber abound within the Cyber Science program and EECS. Research and extracurriculars are primarily supported through the Cyber Research Center and include the Cadet Competitive Cyber Team (C3T), CyberTech, EECS Systers and the Jean Bartik Computing Symposium, and myriad research opportunities.

Honor Societies:
Upsilon Pi Epsilon - International Honor Society for the Computing and Information Disciplines
Phi Kappa Phi - Oldest and Largest Collegiate Honor Society

To learn more about enrichment for this area of study, visit the Department of Electrical Engineering and Computer Science.

The Bachelor of Science (B.S.) in Cyber Science at the United States Military Academy is accredited by the Computing Accreditation Commission of ABET, http://www.abet.org, under the General Criteria and the Cybersecurity and Similarly Named Computing Programs Criteria.

Program Educational Objectives

Five to seven years after graduation, cadets who major in Cyber Science will have been successful Army officers who have:‚Äč

  • Initiated and completed tasks that identify aspects of a complex situation that can be enhanced by using computing technology.
  • Applied computing knowledge and security principles and practices individually or in diverse teams to maintain operations in the presence of risks and threats.
  • Used effective communication to explain new computing technology to war fighters in support of current and emerging Army war fighting doctrine.
  • Grown professionally through self-study, continuing education, and professional development.

Student Outcomes

At the time of graduation, graduates of the program will have an ability to:

  • Analyze a complex computing problem and to apply principles of computing and other relevant disciplines to identify solutions.
  • Design, implement, and evaluate a computing-based solution to meet a given set of computing requirements in the context of Cyber Science.
  • Communicate effectively in a variety of professional contexts.
  • Recognize professional responsibilities and make informed judgments in computing practice based on legal and ethical principles.
  • Function effectively as a member or leader of a team engaged in activities appropriate to Cyber Science.
  • Apply security principles and practices to maintain operations in the presence of risks and threats.

Student Enrollment/Number of Graduates by Concentration

Cadet Class 2021*2022*2023*2024202520262027
Cyber Operations 1676599
Cybersecurity 02051275
Network Services 1010211
Machine Learning 0032443
Cyber-Physical Systems 0011100
Total 281214242118

as of: 19 Mar 2024

 

The student enrollment/graduate numbers table show the strength of the year groups in progress or at graduation* both by concentration and for the program as a whole. Some situations are not reflected in these numbers, for instance, cadets graduating late (e.g., in August or December), and those who transferred into the major after the initial declaration window.