{"id":9940,"date":"2022-09-06T10:46:30","date_gmt":"2022-09-06T17:46:30","guid":{"rendered":"https:\/\/www.ewu.edu\/cstem\/?page_id=9940"},"modified":"2025-12-09T13:52:18","modified_gmt":"2025-12-09T21:52:18","slug":"computer-science-cyber-operations-bs","status":"publish","type":"page","link":"https:\/\/www.ewu.edu\/cstem\/cybersecurity\/computer-science-cyber-operations-bs\/","title":{"rendered":"Computer Science Cyber Operations (BS)"},"content":{"rendered":"","protected":false},"excerpt":{"rendered":"","protected":false},"author":517,"featured_media":9938,"parent":5152,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-9940","page","type-page","status-publish","has-post-thumbnail","hentry","page_tags-degree"],"acf":{"background_image_type":"custom","background":{"ID":9943,"id":9943,"title":"computerScience_cyber","filename":"computerScience_cyber.jpg","filesize":161060,"url":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2022\/08\/computerScience_cyber.jpg","link":"https:\/\/www.ewu.edu\/cstem\/cybersecurity\/computer-science-cyber-operations-bs\/computerscience_cyber\/","alt":"","author":"462","description":"","caption":"","name":"computerscience_cyber","status":"inherit","uploaded_to":9940,"date":"2022-08-17 23:15:58","modified":"2022-08-17 23:15:58","menu_order":0,"mime_type":"image\/jpeg","type":"image","subtype":"jpeg","icon":"https:\/\/www.ewu.edu\/cstem\/wp-includes\/images\/media\/default.png","width":1320,"height":720,"sizes":{"thumbnail":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2022\/08\/computerScience_cyber-150x150.jpg","thumbnail-width":150,"thumbnail-height":150,"medium":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2022\/08\/computerScience_cyber-300x164.jpg","medium-width":300,"medium-height":164,"medium_large":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2022\/08\/computerScience_cyber-768x419.jpg","medium_large-width":768,"medium_large-height":419,"large":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2022\/08\/computerScience_cyber-1024x559.jpg","large-width":1024,"large-height":559,"1536x1536":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2022\/08\/computerScience_cyber.jpg","1536x1536-width":1320,"1536x1536-height":720,"2048x2048":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2022\/08\/computerScience_cyber.jpg","2048x2048-width":1320,"2048x2048-height":720,"gform-image-choice-sm":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2022\/08\/computerScience_cyber.jpg","gform-image-choice-sm-width":300,"gform-image-choice-sm-height":164,"gform-image-choice-md":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2022\/08\/computerScience_cyber.jpg","gform-image-choice-md-width":400,"gform-image-choice-md-height":218,"gform-image-choice-lg":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2022\/08\/computerScience_cyber.jpg","gform-image-choice-lg-width":600,"gform-image-choice-lg-height":327}},"background_vertical_alignment":"center","title":"Bachelor of Science ","bold_title":"Computer Science Cyber Operations","content":"","component_options_toggle":false,"component_options":{"component_options_toggle":false,"component_options":{"disable_component":false,"nickname":"","identifier":"","navigable":false}},"primary_content_copy":"<h2>Crack the Code, Stop the Threat<\/h2>\n<p><span style=\"font-weight: 400\">Develop the mindset and skills needed to stay one step ahead of malicious hackers with a Bachelor of Science in Computer Science, Cyber Operations. This advanced program builds on the fundamentals of cyber operations by giving you a deeper understanding of the math and computer science underlying cybersecurity.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400\">You\u2019ll explore advanced topics like cryptography and reverse engineering while also examining the technical and non-technical sides of cyber operations. With numerous opportunities for hands-on learning experiences, you\u2019ll gain a comprehensive view of how real-world cyberattacks work\u2014and how to stop them.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Whether you want to work in national defense, help organizations manage and fight cyber threats, or create the next groundbreaking cybersecurity tool, this program gives you the knowledge and skills to succeed. If you\u2019re curious, driven, and ready to make an impact, your journey begins at EWU.<\/span><\/p>\n<p><a class=\"btn\" href=\"#curriculum\">Curriculum &amp; Requirements<\/a><\/p>\n","blocks":[{"acf_fc_layout":"mirror-content","page":86343,"component_options_toggle":true,"component_options":{"disable_component":false,"nickname":"Why EWU","identifier":"why","navigable":true}},{"acf_fc_layout":"catalog-degree","module_background_color":"off-white","degree_url":"https:\/\/catalog.ewu.edu\/stem\/cs-ee\/computer-science-cyber-operations-bs\/","show_curriculum_and_requirements":true,"replace_curriculum_and_requirements_text":false,"curriculum_and_requirements_replacement_text":"","show_general_education":true,"show_plan_of_study":true,"show_student_learning_outcomes":true,"additional_sections":false,"component_options_toggle":true,"component_options":{"disable_component":false,"nickname":"curriculum","identifier":"curriculum","navigable":false}},{"acf_fc_layout":"copy-with-image","layout":"small-image","show_left":false,"module_background_color":"white","title":"Applied Learning","copy":"<ul>\n<li style=\"font-weight: 400\"><b>Internships:<\/b><span style=\"font-weight: 400\"> Get real-world experience (and often credit or pay) by working in a professional setting connected to your career goals.<\/span><\/li>\n<li style=\"font-weight: 400\"><b>Classroom-Based Applied Learning\/Simulation:<\/b> Practice real-world decision-making through simulations, case studies, role playing, and other hands-on activities in the classroom.<\/li>\n<\/ul>\n","image":{"ID":12818,"id":12818,"title":"2024-2-10 Cyber Camp_2.1.1","filename":"2024-2-10-Cyber-Camp_2.1.1.jpg","filesize":465329,"url":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2024\/07\/2024-2-10-Cyber-Camp_2.1.1.jpg","link":"https:\/\/www.ewu.edu\/cstem\/cyber\/2024-2-10-cyber-camp_2-1-1\/","alt":"","author":"462","description":"","caption":"","name":"2024-2-10-cyber-camp_2-1-1","status":"inherit","uploaded_to":12744,"date":"2024-07-26 21:55:40","modified":"2024-07-26 21:57:11","menu_order":0,"mime_type":"image\/jpeg","type":"image","subtype":"jpeg","icon":"https:\/\/www.ewu.edu\/cstem\/wp-includes\/images\/media\/default.png","width":1200,"height":675,"sizes":{"thumbnail":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2024\/07\/2024-2-10-Cyber-Camp_2.1.1-150x150.jpg","thumbnail-width":150,"thumbnail-height":150,"medium":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2024\/07\/2024-2-10-Cyber-Camp_2.1.1-300x169.jpg","medium-width":300,"medium-height":169,"medium_large":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2024\/07\/2024-2-10-Cyber-Camp_2.1.1-768x432.jpg","medium_large-width":768,"medium_large-height":432,"large":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2024\/07\/2024-2-10-Cyber-Camp_2.1.1-1024x576.jpg","large-width":1024,"large-height":576,"1536x1536":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2024\/07\/2024-2-10-Cyber-Camp_2.1.1.jpg","1536x1536-width":1200,"1536x1536-height":675,"2048x2048":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2024\/07\/2024-2-10-Cyber-Camp_2.1.1.jpg","2048x2048-width":1200,"2048x2048-height":675,"gform-image-choice-sm":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2024\/07\/2024-2-10-Cyber-Camp_2.1.1.jpg","gform-image-choice-sm-width":300,"gform-image-choice-sm-height":169,"gform-image-choice-md":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2024\/07\/2024-2-10-Cyber-Camp_2.1.1.jpg","gform-image-choice-md-width":400,"gform-image-choice-md-height":225,"gform-image-choice-lg":"https:\/\/www.ewu.edu\/cstem\/wp-content\/uploads\/sites\/5\/2024\/07\/2024-2-10-Cyber-Camp_2.1.1.jpg","gform-image-choice-lg-width":600,"gform-image-choice-lg-height":338}},"youtube_video_id":"N7UJ-NIVTVc","video_orientation":"horizontal","image_alt":"Two EWU computer science cyber students work on a group project in class.","secondary_image":"Geo-texture-Red.svg","background_vertical_alignment":"center","background_horizontal_alignment":"center","background_crop":"chevron","component_options_toggle":true,"component_options":{"disable_component":false,"nickname":"Applied Learning","identifier":"applied","navigable":false}},{"acf_fc_layout":"copy-with-image","layout":"youtube","show_left":true,"module_background_color":"off-white","title":"Alumni Spotlight","copy":"<p>James Wilson, now Vice President of Engineering at cloud management and optimization company nOps, describes his role and how EWU prepared him for real-world success.<\/p>\n<p>&#8220;What I love most about this career is the opportunity to work with young, aspiring engineers and help them develop their careers. What I learned when I [entered] the industry was that I got a great education in computer science at Eastern.&#8221;<\/p>\n","image":false,"youtube_video_id":"N7UJ-NIVTVc","video_orientation":"horizontal","image_alt":"","secondary_image":"Squiggly-lines-Blk.svg","background_vertical_alignment":"center","background_horizontal_alignment":"center","background_crop":"chevron","component_options_toggle":true,"component_options":{"disable_component":false,"nickname":"Success Story","identifier":"story","navigable":true}},{"acf_fc_layout":"calls-to-action","module_background_tri_color":"red","include_header":true,"title":"","subtitle":"","buttons":[{"link":{"title":"Visit Campus","url":"https:\/\/www.ewu.edu\/apply\/visit-ewu\/","target":""},"icon":"map-marker"},{"link":{"title":"Request Info","url":"https:\/\/www.ewu.edu\/information-request\/?ref=cybersecurity-home","target":""},"icon":"clipboard"},{"link":{"title":"Apply to EWU","url":"https:\/\/www.ewu.edu\/apply\/?ref=cybersecurity-home","target":""},"icon":"eagle"}],"component_options_toggle":false,"component_options":{"disable_component":false,"nickname":"","identifier":"","navigable":false}}],"secondary_nav_menu_type":"parent","page_hide_sidebar":false,"page_enable_page_nav":false,"text_style":"regular","readability_aid":"overlay","page_override_title":"","intro_title":"","page_persona_bar_default_tab":""},"_links":{"self":[{"href":"https:\/\/www.ewu.edu\/cstem\/wp-json\/wp\/v2\/pages\/9940","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ewu.edu\/cstem\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.ewu.edu\/cstem\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.ewu.edu\/cstem\/wp-json\/wp\/v2\/users\/517"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ewu.edu\/cstem\/wp-json\/wp\/v2\/comments?post=9940"}],"version-history":[{"count":25,"href":"https:\/\/www.ewu.edu\/cstem\/wp-json\/wp\/v2\/pages\/9940\/revisions"}],"predecessor-version":[{"id":87670,"href":"https:\/\/www.ewu.edu\/cstem\/wp-json\/wp\/v2\/pages\/9940\/revisions\/87670"}],"up":[{"embeddable":true,"href":"https:\/\/www.ewu.edu\/cstem\/wp-json\/wp\/v2\/pages\/5152"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.ewu.edu\/cstem\/wp-json\/wp\/v2\/media\/9938"}],"wp:attachment":[{"href":"https:\/\/www.ewu.edu\/cstem\/wp-json\/wp\/v2\/media?parent=9940"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}