Bachelor in Cyber Engineering

Undergraduate Program in Cyber Operations by the University of Arizona at UTC Global Tunisia


The Bachelor of Applied Science in Cyber Operations gives students extensive hands-on experience and develops the knowledge, skills and abilities necessary to succeed in defense, law enforcement and private industry.

Rising cyber crime has created a global shortage of information security professionals, transforming this field into one of immense growth and opportunities. The Cyber Operations degree equips you to enter those roles and meet that demand.

The curriculum delivers offensive and defensive cyber security content within our state-of-the-art Cyber Virtual Learning Environment, which allows you to gain extensive hands-on experience and develop the knowledge, skills and abilities necessary to succeed after graduating. In addition, the Cyber Operations degrees offers three degree emphases: Engineering, Defense & Forensics, and Cyber Law & Policy.

The National Security Agency has designated the University of Arizona’s Cyber Operations program as a Center of Academic Excellence in Cyber Operations (CAE-CO). With this designation, UA joins an extremely exclusive group of only 20 programs in the nation. The NSA’s CAE-CO designation demonstrates that UA’s Cyber Operations program meets the most demanding academic and technical requirements.

Contact Us

To learn more about our programs, fill out this form:


The University of Arizona programs at UTC offer you different specializations for this major.
University of Arizona Engineering Specialization at UTC Tunisia


Forensics Fingerprint

Defense and Forensics

University of Arizona Cyber Law and Policy at UTC Tunisia

Cyber Law and Policy

Sample Courses

Wondering about the specific classes you can take in this program? See the course descriptions below

CYBV 454: Malware Threats & Analysis

CYBV 454: Malware Threats & Analysis – Acquisition of the methodologies used to safely perform static and dynamic analysis of software of potentially unknown origin, including obfuscated malwares, to fully understand the software’s functionality and specifications.

CYBV 388: Cyber Investigations and Forensics

Study of intrusion detection methodologies, tools, and approaches to incident response; examination of computer forensic principles, including operating system concepts, registry structures, file system concepts, boot process, low-level hardware calls, and file operations.

CYBV 435: Cyber Threat Intelligence

An in-depth investigation of threat actors and the techniques they employ to attack networks. Formal ethical hacking methodology including reconnaissance, scanning and enumeration, gaining access, escalation of privilege, maintain access and reporting is examined.


Discover the advantages of the International Programs UTC offers.