CERTIFICATES

Information Warfare Certificate

INTV 305 will provide a broad overview of the American intelligence systems - collection, analysis, counterintelligence, and covert operations - and demonstrate how these systems work together to provide a \"decision advantage\" for policy makers. Students will also learn how US adversaries have shifted away from directly challenging American forces and have moved to a less risky hybrid warfare model to achieve their tactical and strategic goals. Students will use a combination of research and critical thinking exercises to gain an understanding of importance of how intelligence is used to inform the decision-making process as well as how to detect and guard against adversarial information operations designed manipulate information to induce decision makers to act against their own best interests.

This course is an introduction to the capabilities and uses of psychological operations. Students will examine psychological operations capabilities, limitations, history, and challenges. As part of their learning experience, students will establish when psychological operations are appropriate, how to know when they have become the target of an effort to manipulate their behavior and how to mitigate its effects, and plan a psychological operation against a notional target.

INTV 354 will provide students with an overview of the fundamentals of Open Source Intelligence. Students will be presented with the most effective methodologies used by cyber professionals, law enforcement, and other investigative personnel to locate and analyze information on the Internet and Dark Web. Students will use interactive exercises to become familiar with the volume of sensitive data on the Internet and how it can be exploited to develop highly detailed intelligence products.

INTV437 will provide students with an introduction to the concepts of deception, counter-deception, counterintelligence, and psychological operations. A survey of how these concepts are used in adversarial Information Operations and why they are among the most effective mechanisms to sway public opinion will be presented. Students will use interactive exercises to become familiar with how to detect deception campaigns as well as the mitigation strategies to defend against them.

INTV 450 will provide students with an in-depth overview of the tactics, techniques, procedures, and tools used to conduct and defend against Information Operation campaigns. Students will analyze case studies involving Nation State actors' online influence efforts in order to detect, deconstruct, and counter adversarial Information Operation campaigns.

CYBV 481 will provide students with an advanced analysis of the tactics, techniques, and tools used to conduct and defend against Social Engineering attacks. A survey of why social engineering attacks are among the most effective Cyber-attack mechanisms and what can be done to mitigate them will be presented. Students will use interactive exercises to master social engineering attacks and defenses in order to be able to develop policies and procedures to increase organizational security posture.

Signals Intelligence and Electronic Warfare Certificate

INTV210 will provide students with a broad understanding of the fundamentals of radio frequency (RF) analysis. This course is designed to provide a comprehensive exploration of the electromagnetic spectrum, the behavior of electromagnetic waves, and the methods used to analyze signals in both the time and frequency domains. Students will learn how to measure and assess the usage of frequency bands, and how spectrum management provides the regulatory and strategic aspects of efficient frequency allocation and interference mitigation.

INTV220 provides an in-depth exploration of the foundational concepts and techniques used in Signals Intelligence (SIGINT) and Electronic Warfare (EW). Students will learn about analog and digital signals, their propagation, and the principles that govern their transmission and reception. Students will examine the critical factors of attenuation and path loss, understanding how these phenomena affect signal strength and quality in real-world scenarios. By the end of the course, students will be able to perform link budget analysis, integrating all aspects of signal transmission to evaluate communication link effectiveness.

Provides a methodology for analyzing networks by examining the network at its infrastructure, network and applications layers; exploring how they transfer data; investigating how network protocols work to enable communication; and probing and analyzing how the lower-level network layers support the upper ones. Students will use hands-on labs and exercises to investigate and analyze network fundamentals.

INTV230 will provide an in-depth exploration of RF modulation and keying techniques with a focus on applications in signals intelligence (SIGINT) and electronic warfare (EW). Students will gain a comprehensive understanding of how modulation and keying are used to transmit, intercept, and analyze RF signals in complex electromagnetic environments. The course combines theoretical knowledge with practical skills, preparing students for roles in defense, intelligence, and advanced telecommunications.

INTV240 will provide students with a foundational understanding of the principles and practices of Signals Intelligence (SIGINT) and Electronic Warfare (EW). Students will explore the methods and technologies used to intercept, analyze, and disrupt enemy communications and radar systems. The course combines theoretical knowledge with practical applications, preparing students for further study in intelligence and defense sectors.

Provides an introduction to wireless networking, mobile device hardware and software architectures as well as the application of security fundamentals for mobile computing systems. Students will be able to describe user associations and routing in a cellular/mobile network, interaction of elements within the cellular/mobile core, and end-to-end delivery of a packet and/or signal and what happens with the hand-off at each step along the communications path. They will be able to explain differences in core architecture between different generations of cellular and mobile network technologies.

Join the front lines of intelligence and cyber defense

Contact gsiqueiros4@arizona.edu or pscanlo2@arizona.edu to LEARN MORE about the Bachelor of Applied Science in Cyber and Intelligence Operations from the University of Arizona's College of Engineering.

APPLY TODAY!