{"id":9936,"date":"2022-09-06T10:35:35","date_gmt":"2022-09-06T17:35:35","guid":{"rendered":"https:\/\/www.ewu.edu\/cstem\/?page_id=9936"},"modified":"2026-03-05T15:45:33","modified_gmt":"2026-03-05T23:45:33","slug":"cyber-operations-bs","status":"publish","type":"page","link":"https:\/\/www.ewu.edu\/cstem\/cybersecurity\/cyber-operations-bs\/","title":{"rendered":"Cyber Operations (BS)"},"content":{"rendered":"","protected":false},"excerpt":{"rendered":"","protected":false},"author":462,"featured_media":0,"parent":5152,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-9936","page","type-page","status-publish","hentry","page_tags-degree"],"acf":{"background_image_type":"custom","background":{"ID":9938,"id":9938,"title":"cyber-operationsjpg","filename":"cyber-operationsjpg.jpg","filesize":114789,"url":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2022\/08\/cyber-operationsjpg.jpg","link":"https:\/\/www.ewu.edu\/cstem\/cybersecurity\/cyber-operations-bs\/cyber-operationsjpg\/","alt":"person interacting with phone interface","author":"462","description":"","caption":"","name":"cyber-operationsjpg","status":"inherit","uploaded_to":9936,"date":"2022-08-17 22:57:29","modified":"2022-08-17 22:58:09","menu_order":0,"mime_type":"image\/jpeg","type":"image","subtype":"jpeg","icon":"https:\/\/www.ewu.edu\/cstem\/wp-includes\/images\/media\/default.png","width":1800,"height":1013,"sizes":{"thumbnail":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2022\/08\/cyber-operationsjpg-150x150.jpg","thumbnail-width":150,"thumbnail-height":150,"medium":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2022\/08\/cyber-operationsjpg-300x169.jpg","medium-width":300,"medium-height":169,"medium_large":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2022\/08\/cyber-operationsjpg-768x432.jpg","medium_large-width":768,"medium_large-height":432,"large":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2022\/08\/cyber-operationsjpg-1024x576.jpg","large-width":1024,"large-height":576,"1536x1536":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2022\/08\/cyber-operationsjpg-1536x864.jpg","1536x1536-width":1536,"1536x1536-height":864,"2048x2048":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2022\/08\/cyber-operationsjpg.jpg","2048x2048-width":1800,"2048x2048-height":1013,"gform-image-choice-sm":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2022\/08\/cyber-operationsjpg.jpg","gform-image-choice-sm-width":300,"gform-image-choice-sm-height":169,"gform-image-choice-md":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2022\/08\/cyber-operationsjpg.jpg","gform-image-choice-md-width":400,"gform-image-choice-md-height":225,"gform-image-choice-lg":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2022\/08\/cyber-operationsjpg.jpg","gform-image-choice-lg-width":600,"gform-image-choice-lg-height":338}},"background_vertical_alignment":"center","title":"Bachelor of Science","bold_title":"Cyber Operations ","content":"","component_options_toggle":false,"component_options":{"component_options_toggle":false,"component_options":{"disable_component":false,"nickname":"","identifier":"","navigable":false}},"primary_content_copy":"<h2>Protect the Systems Society Relies On<\/h2>\n<p><span style=\"font-weight: 400;\">As cybercrime continues to rise, skilled defenders are more essential than ever\u2014that\u2019s where you come in. At Eastern Washington University, you\u2019ll develop in-demand skills in programming, network security, cybersecurity, and more through our NSA-certified Cyber Operations degree program.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Learn how to track and stop hackers, analyze malware, defend networks, and respond to threats in real time. You\u2019ll also explore the ethical, legal, and human aspects of cybersecurity, gaining a deeper understanding of how cyberattacks happen and why they matter.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Gain hands-on experience with real-world tools, access internship opportunities, and connect with industry pros who can help guide your career. By the time you graduate, you\u2019ll be ready to make an impact and help shape the future of cybersecurity.<\/span><\/p>\n<p><a class=\"btn\" href=\"#curriculum\">Curriculum &amp; Requirements<\/a><\/p>\n    <div style=\"margin-top: 30px; margin-bottom: 30px;\">\n        <lite-youtube\n    style=\"position: relative; padding-bottom: 56.25%; height: 0; overflow: hidden; max-width: 100%;\"\n    videoid=\"JqYf1Z1-KfA\" playlabel=\"Play video\"><\/lite-youtube>\n    <\/div>\n    \n","blocks":[{"acf_fc_layout":"mirror-content","page":86343,"component_options_toggle":true,"component_options":{"disable_component":false,"nickname":"Why EWU","identifier":"why","navigable":true}},{"acf_fc_layout":"copy-with-image","layout":"youtube","show_left":true,"module_background_color":"off-white","title":"Student Spotlight","copy":"<p><span style=\"font-weight: 400;\">Bree Lang, a cybersecurity student and Vice President of the Cyber Club at EWU, shares what she loves about the program.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">&#8220;It&#8217;s a very supportive community. I feel that I can be successful because of the people I&#8217;m surrounded by. There are also real-world applications that the cyber program allows for. There are ways to get internships and to network and meet people who are already in the field.&#8221;<\/span><\/p>\n<p><a class=\"btn\" href=\"https:\/\/www.youtube.com\/@EWUCybersecurity\">Hear More Student Stories<\/a><\/p>\n","image":false,"youtube_video_id":"JqYf1Z1-KfA","video_orientation":"vertical","image_alt":"","secondary_image":"Geo-texture-blk.svg","background_vertical_alignment":"center","background_horizontal_alignment":"center","background_crop":"chevron","component_options_toggle":true,"component_options":{"disable_component":true,"nickname":"Student Story","identifier":"story","navigable":true}},{"acf_fc_layout":"catalog-degree","module_background_color":"off-white","degree_url":"https:\/\/catalog.ewu.edu\/stem\/cs-ee\/cyber-operations-bs\/","show_curriculum_and_requirements":true,"replace_curriculum_and_requirements_text":false,"curriculum_and_requirements_replacement_text":"","show_general_education":true,"show_plan_of_study":true,"show_student_learning_outcomes":true,"additional_sections":false,"component_options_toggle":true,"component_options":{"disable_component":false,"nickname":"Curriculum","identifier":"curriculum","navigable":false}},{"acf_fc_layout":"copy-with-image","layout":"small-image","show_left":false,"module_background_color":"white","title":"Applied Learning Opportunities","copy":"<ul>\n<li style=\"font-weight: 400;\"><b>Internships:<\/b><span style=\"font-weight: 400;\"> Get real-world experience (and often credit or pay) by working in a professional setting connected to your career goals.<\/span><\/li>\n<li style=\"font-weight: 400;\"><b>Classroom-Based Applied Learning\/Simulation:<\/b><span style=\"font-weight: 400;\"> Practice real-world decision-making through simulations, case studies, role playing, and other hands-on activities in the classroom.<\/span><\/li>\n<li style=\"font-weight: 400;\"><b>Applied Laboratory Work:<\/b> Build practical, career-ready skills by working hands-on in labs that mirror professional lab environments.<\/li>\n<\/ul>\n","image":{"ID":87246,"id":87246,"title":"2024-2-10 Cyber Camp_1.5.1 (1)","filename":"2024-2-10-Cyber-Camp_1.5.1-1.jpg","filesize":107758,"url":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2025\/09\/2024-2-10-Cyber-Camp_1.5.1-1.jpg","link":"https:\/\/www.ewu.edu\/cstem\/cyber\/2024-2-10-cyber-camp_1-5-1-1\/","alt":"Two cyber students at their computers","author":"462","description":"","caption":"","name":"2024-2-10-cyber-camp_1-5-1-1","status":"inherit","uploaded_to":12744,"date":"2025-09-16 16:30:15","modified":"2025-09-16 16:30:32","menu_order":0,"mime_type":"image\/jpeg","type":"image","subtype":"jpeg","icon":"https:\/\/www.ewu.edu\/cstem\/wp-includes\/images\/media\/default.png","width":1200,"height":675,"sizes":{"thumbnail":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2025\/09\/2024-2-10-Cyber-Camp_1.5.1-1-150x150.jpg","thumbnail-width":150,"thumbnail-height":150,"medium":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2025\/09\/2024-2-10-Cyber-Camp_1.5.1-1-300x169.jpg","medium-width":300,"medium-height":169,"medium_large":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2025\/09\/2024-2-10-Cyber-Camp_1.5.1-1-768x432.jpg","medium_large-width":768,"medium_large-height":432,"large":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2025\/09\/2024-2-10-Cyber-Camp_1.5.1-1-1024x576.jpg","large-width":1024,"large-height":576,"1536x1536":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2025\/09\/2024-2-10-Cyber-Camp_1.5.1-1.jpg","1536x1536-width":1200,"1536x1536-height":675,"2048x2048":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2025\/09\/2024-2-10-Cyber-Camp_1.5.1-1.jpg","2048x2048-width":1200,"2048x2048-height":675,"gform-image-choice-sm":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2025\/09\/2024-2-10-Cyber-Camp_1.5.1-1.jpg","gform-image-choice-sm-width":300,"gform-image-choice-sm-height":169,"gform-image-choice-md":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2025\/09\/2024-2-10-Cyber-Camp_1.5.1-1.jpg","gform-image-choice-md-width":400,"gform-image-choice-md-height":225,"gform-image-choice-lg":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2025\/09\/2024-2-10-Cyber-Camp_1.5.1-1.jpg","gform-image-choice-lg-width":600,"gform-image-choice-lg-height":338}},"youtube_video_id":"JqYf1Z1-KfA","video_orientation":"vertical","image_alt":"Cyber students work in the classroom.","secondary_image":"Squiggly-lines-Blk.svg","background_vertical_alignment":"center","background_horizontal_alignment":"center","background_crop":"chevron","component_options_toggle":true,"component_options":{"disable_component":false,"nickname":"Applied Learning","identifier":"appliedlearning","navigable":false}},{"acf_fc_layout":"calls-to-action","module_background_tri_color":"red","include_header":false,"title":"","subtitle":"","buttons":[{"link":{"title":"Request Info","url":"https:\/\/www.ewu.edu\/information-request\/?ref=cybersecurity-home","target":""},"icon":"clipboard"},{"link":{"title":"Visit Campus","url":"https:\/\/www.ewu.edu\/apply\/visit-ewu\/","target":""},"icon":"map-marker"},{"link":{"title":"Apply to EWU","url":"https:\/\/www.ewu.edu\/apply\/?ref=cybersecurity-home","target":""},"icon":"eagle"}],"component_options_toggle":false,"component_options":{"disable_component":false,"nickname":"","identifier":"","navigable":false}}],"secondary_nav_menu_type":"parent","page_hide_sidebar":false,"page_enable_page_nav":false,"text_style":"regular","readability_aid":"overlay","page_override_title":"","intro_title":"","page_persona_bar_default_tab":""},"_links":{"self":[{"href":"https:\/\/www.ewu.edu\/cstem\/wp-json\/wp\/v2\/pages\/9936","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ewu.edu\/cstem\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.ewu.edu\/cstem\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.ewu.edu\/cstem\/wp-json\/wp\/v2\/users\/462"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ewu.edu\/cstem\/wp-json\/wp\/v2\/comments?post=9936"}],"version-history":[{"count":28,"href":"https:\/\/www.ewu.edu\/cstem\/wp-json\/wp\/v2\/pages\/9936\/revisions"}],"predecessor-version":[{"id":88056,"href":"https:\/\/www.ewu.edu\/cstem\/wp-json\/wp\/v2\/pages\/9936\/revisions\/88056"}],"up":[{"embeddable":true,"href":"https:\/\/www.ewu.edu\/cstem\/wp-json\/wp\/v2\/pages\/5152"}],"wp:attachment":[{"href":"https:\/\/www.ewu.edu\/cstem\/wp-json\/wp\/v2\/media?parent=9936"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}