HTTP 200 OK
Allow: GET, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept
{
"id": 1047,
"name": "Cyber Operations Undergraduate Certificate",
"descriptions": [
{
"id": 291109,
"description_type": {
"id": 2,
"name": "Catalog Description"
},
"description": "<p>This certificate distinguishes those students with special training in cyber operations. Recommended for students majoring in Computer Science, Information Technology, and Computer Engineering seeking additional academic content in cyber security.</p><h2>Admission Requirements</h2><ul> <li>None</li> </ul><h2>Certificate Requirements</h2><ul> <li>None</li> </ul><h2>Prerequisite Courses</h2><ul> <li>None</li> </ul>",
"primary": false,
"program": 1047,
"update_url": "https://search.cm.ucf.edu/api/v1/descriptions/291109/?format=api"
},
{
"id": 291110,
"description_type": {
"id": 3,
"name": "Full Catalog Description"
},
"description": "<p>This certificate distinguishes those students with special training in cyber operations. Recommended for students majoring in Computer Science, Information Technology, and Computer Engineering seeking additional academic content in cyber security.</p><h2>Admission Requirements</h2><ul> <li>None</li> </ul><h2>Certificate Requirements</h2><ul> <li>None</li> </ul><h2>Prerequisite Courses</h2><ul> <li>None</li> </ul><h2>Degree Requirements</h2><h3>Required Courses</h3> 30 - 34 Total Credits <ul><li>Complete all of the following<ul><li>Complete the following: <ul><li>COP3502C - Computer Science I (3)</li><li>CIS3360 - Security in Computing (3)</li><li>CIS3362 - Cryptography and Information Security (3)</li><li>CIS4615 - Secure Software Development and Assurance (3)</li><li>CIS4940C - Topics in Cybersecurity (3)</li><li>CAP4145 - Introduction to Malware Analysis (3)</li></ul></li><li>Complete at least 1 of the following: <ul><li>COT3100C - Introduction to Discrete Structures (3)</li><li>MAD2104 - Foundations of Discrete Math (3)</li></ul></li><li>Complete at least 1 of the following: <ul><li>COP4600 - Operating Systems (3)</li><li>CGS3763 - Operating System Concepts (3)</li></ul></li><li>Complete at least 1 of the following: <ul><li>CNT4704 - Analysis of Computer Communication Networks (3)</li><li>EEL4781 - Computer Communication Networks (3)</li></ul></li>Select one of the following sequences of courses:<li>Complete 1 of the following<ul><li>Complete the following: <ul><li>CDA3103C - Computer Logic and Organization (3)</li><li>EEL4768 - Computer Architecture (3)</li></ul></li><li>Or</li><li>Complete the following: <ul><li>EEL3801C - Computer Organization (4)</li><li>EEL4768 - Computer Architecture (3)</li></ul></li><li>Or</li><li>Complete the following: <ul><li>CGS3269 - Computer Architecture Concepts (3)</li></ul></li></ul></li></ul></li></ul><h3>Restricted Electives</h3> 9 Total Credits <ul><li>Earn at least 9 credits from the following: <ul><li>CAP3104 - Foundations of HCI (3)</li><li>CIS4203C - Digital Forensics (3)</li><li>CIS4524 - Managing IT Integration (3)</li><li>CNT4714 - Enterprise Computing (3)</li><li>COP3402 - Systems Software (3)</li><li>EEE4346C - Hardware Security and Trusted Circuit Design (3)</li><li>EEL4783 - Hardware Description Languages in Digital Systems Design (3)</li><li>EEL5722C - Field-Programmable Gate Array (FPGA) Design (3)</li><li>CIS4364 - Cyber Defense Analysis (3)</li></ul></li></ul><h4>Grand Total Credits: <strong>39 - 43</strong></h4><h4><br/>Foreign Language Requirements</h4><ul> <li> None </li> </ul><h3><br/><br/>Total Undergraduate Credit Hours Required: 39</h3><h4><br/><br/>Other Requirements</h4><ul> <li>A grade of \"C\" (2.0) or better is required in each course toward this certificate.</li> <li>A student may not earn both the Cyber Operations Certificate and the Secure Computing and Networks Minor.</li> <li>Total hours required may vary based on courses selected to meet requirements.</li> </ul>",
"primary": false,
"program": 1047,
"update_url": "https://search.cm.ucf.edu/api/v1/descriptions/291110/?format=api"
},
{
"id": 291111,
"description_type": {
"id": 4,
"name": "Source Catalog Description"
},
"description": "<p>This certificate distinguishes those students with special training in cyber operations. Recommended for students majoring in Computer Science, Information Technology, and Computer Engineering seeking additional academic content in cyber security.</p> <h2>Admission Requirements</h2> <ul> <li>None</li> </ul> <h2>Certificate Requirements</h2> <ul> <li>None</li> </ul> <h2>Prerequisite Courses</h2> <ul> <li>None</li> </ul>",
"primary": false,
"program": 1047,
"update_url": "https://search.cm.ucf.edu/api/v1/descriptions/291111/?format=api"
},
{
"id": 291112,
"description_type": {
"id": 5,
"name": "Source Catalog Curriculum"
},
"description": "<h1>Degree Requirements</h1><div><section><header data-test=\"grouping-0-header\"><div><h2 data-testid=\"grouping-label\"><span>Required Courses</span></h2></div><div><span>30 - 34</span><span>Total Credits</span></div><div><div><button aria-label=\"Collapse\"><i></i></button></div></div></header><div><div><ul><li><span>Complete <!-- -->all<!-- --> of the following</span><ul><li data-test=\"ruleView-A\"><div data-test=\"ruleView-A-result\">Complete the following: <div><ul style=\"margin-top:5px;margin-bottom:5px\"><li><span><a href=\"#/courses/view/60ca6a6ca38edf7b4f3ec2d0\" target=\"_blank\">COP3502C</a> <!-- -->-<!-- --> <!-- -->Computer Science I<!-- --> <span style=\"margin-left:5px\">(3)</span></span></li><li><span><a href=\"#/courses/view/60ca6a4d00f827681a140d4e\" target=\"_blank\">CIS3360</a> <!-- -->-<!-- --> <!-- -->Security in Computing<!-- --> <span style=\"margin-left:5px\">(3)</span></span></li><li><span><a href=\"#/courses/view/60ca6a4de6bc790e9573e462\" target=\"_blank\">CIS3362</a> <!-- -->-<!-- --> <!-- -->Cryptography and Information Security<!-- --> <span style=\"margin-left:5px\">(3)</span></span></li><li><span><a href=\"#/courses/view/60ca6a4d5a158326529e6c66\" target=\"_blank\">CIS4615</a> <!-- -->-<!-- --> <!-- -->Secure Software Development and Assurance<!-- --> <span style=\"margin-left:5px\">(3)</span></span></li><li><span><a href=\"#/courses/view/60ca6a53a38edf55ad3ec292\" target=\"_blank\">CIS4940C</a> <!-- -->-<!-- --> <!-- -->Topics in Cybersecurity<!-- --> <span style=\"margin-left:5px\">(3)</span></span></li><li><span><a href=\"#/courses/view/60ca6a2ba8d2fb5b8a2d8042\" target=\"_blank\">CAP4145</a> <!-- -->-<!-- --> <!-- -->Introduction to Malware Analysis<!-- --> <span style=\"margin-left:5px\">(3)</span></span></li></ul></div></div></li><li data-test=\"ruleView-B\"><div data-test=\"ruleView-B-result\">Complete at least <span>1</span> of the following: <div><ul style=\"margin-top:5px;margin-bottom:5px\"><li><span><a href=\"#/courses/view/654135bf02bb85af2f36957f\" target=\"_blank\">COT3100C</a> <!-- -->-<!-- --> <!-- -->Introduction to Discrete Structures<!-- --> <span style=\"margin-left:5px\">(3)</span></span></li><li><span><a href=\"#/courses/view/60ca7fb85ada37282dec9f18\" target=\"_blank\">MAD2104</a> <!-- -->-<!-- --> <!-- -->Foundations of Discrete Math<!-- --> <span style=\"margin-left:5px\">(3)</span></span></li></ul></div></div></li><li data-test=\"ruleView-C\"><div data-test=\"ruleView-C-result\">Complete at least <span>1</span> of the following: <div><ul style=\"margin-top:5px;margin-bottom:5px\"><li><span><a href=\"#/courses/view/60ca6a6f714b5fb1e7521ffa\" target=\"_blank\">COP4600</a> <!-- -->-<!-- --> <!-- -->Operating Systems<!-- --> <span style=\"margin-left:5px\">(3)</span></span></li><li><span><a href=\"#/courses/view/60ca6a44a8d2fb2ee62d807f\" target=\"_blank\">CGS3763</a> <!-- -->-<!-- --> <!-- -->Operating System Concepts<!-- --> <span style=\"margin-left:5px\">(3)</span></span></li></ul></div></div></li><li data-test=\"ruleView-D\"><div data-test=\"ruleView-D-result\">Complete at least <span>1</span> of the following: <div><ul style=\"margin-top:5px;margin-bottom:5px\"><li><span><a href=\"#/courses/view/60ca6a66a8d2fbcf242d80a6\" target=\"_blank\">CNT4704</a> <!-- -->-<!-- --> <!-- -->Analysis of Computer Communication Networks<!-- --> <span style=\"margin-left:5px\">(3)</span></span></li><li><span><a href=\"#/courses/view/60ca6b476b6b62608a400131\" target=\"_blank\">EEL4781</a> <!-- -->-<!-- --> <!-- -->Computer Communication Networks<!-- --> <span style=\"margin-left:5px\">(3)</span></span></li></ul></div></div></li><div><span>Select one of the following sequences of courses:</span><li><span>Complete <!-- -->1<!-- --> of the following</span><ul><li data-test=\"ruleView-E.1\"><div data-test=\"ruleView-E.1-result\">Complete the following: <div><ul style=\"margin-top:5px;margin-bottom:5px\"><li><span><a href=\"#/courses/view/60ca6a3c00f827fb2e140d21\" target=\"_blank\">CDA3103C</a> <!-- -->-<!-- --> <!-- -->Computer Logic and Organization<!-- --> <span style=\"margin-left:5px\">(3)</span></span></li><li><span><a href=\"#/courses/view/60ca6b46a38edfa48b3ec3fe\" target=\"_blank\">EEL4768</a> <!-- -->-<!-- --> <!-- -->Computer Architecture<!-- --> <span style=\"margin-left:5px\">(3)</span></span></li></ul></div></div></li><li data-test=\"ruleView-E.5\"><div data-test=\"ruleView-E.5-result\"><div>Or</div></div></li><li data-test=\"ruleView-E.2\"><div data-test=\"ruleView-E.2-result\">Complete the following: <div><ul style=\"margin-top:5px;margin-bottom:5px\"><li><span><a href=\"#/courses/view/66e8294c3d626926fa0d36be\" target=\"_blank\">EEL3801C</a> <!-- -->-<!-- --> <!-- -->Computer Organization<!-- --> <span style=\"margin-left:5px\">(4)</span></span></li><li><span><a href=\"#/courses/view/60ca6b46a38edfa48b3ec3fe\" target=\"_blank\">EEL4768</a> <!-- -->-<!-- --> <!-- -->Computer Architecture<!-- --> <span style=\"margin-left:5px\">(3)</span></span></li></ul></div></div></li><li data-test=\"ruleView-E.4\"><div data-test=\"ruleView-E.4-result\"><div>Or</div></div></li><li data-test=\"ruleView-E.3\"><div data-test=\"ruleView-E.3-result\">Complete the following: <div><ul style=\"margin-top:5px;margin-bottom:5px\"><li><span><a href=\"#/courses/view/60ca6a4300f827ca80140d2f\" target=\"_blank\">CGS3269</a> <!-- -->-<!-- --> <!-- -->Computer Architecture Concepts<!-- --> <span style=\"margin-left:5px\">(3)</span></span></li></ul></div></div></li></ul></li></div></ul></li></ul></div></div></section><section><header data-test=\"grouping-1-header\"><div><h2 data-testid=\"grouping-label\"><span>Restricted Electives</span></h2></div><div><span>9</span><span>Total Credits</span></div><div><div><button aria-label=\"Collapse\"><i></i></button></div></div></header><div><div><ul><li data-test=\"ruleView-A\"><div data-test=\"ruleView-A-result\">Earn at least <span>9</span> credits from the following: <div><ul style=\"margin-top:5px;margin-bottom:5px\"><li><span><a href=\"#/courses/view/60ca6a2ba38edf73bb3ec207\" target=\"_blank\">CAP3104</a> <!-- -->-<!-- --> <!-- -->Foundations of HCI<!-- --> <span style=\"margin-left:5px\">(3)</span></span></li><li><span><a href=\"#/courses/view/60ca6a4da38edf17483ec27f\" target=\"_blank\">CIS4203C</a> <!-- -->-<!-- --> <!-- -->Digital Forensics<!-- --> <span style=\"margin-left:5px\">(3)</span></span></li><li><span><a href=\"#/courses/view/61a5438927cb919f010b663f\" target=\"_blank\">CIS4524</a> <!-- -->-<!-- --> <!-- -->Managing IT Integration<!-- --> <span style=\"margin-left:5px\">(3)</span></span></li><li><span><a href=\"#/courses/view/60ca6a6ba38edfae563ec2ca\" target=\"_blank\">CNT4714</a> <!-- -->-<!-- --> <!-- -->Enterprise Computing<!-- --> <span style=\"margin-left:5px\">(3)</span></span></li><li><span><a href=\"#/courses/view/60ca6a6d6b6b6267c8400088\" target=\"_blank\">COP3402</a> <!-- -->-<!-- --> <!-- -->Systems Software<!-- --> <span style=\"margin-left:5px\">(3)</span></span></li><li><span><a href=\"#/courses/view/60ca6b3102fd3a74276d840a\" target=\"_blank\">EEE4346C</a> <!-- -->-<!-- --> <!-- -->Hardware Security and Trusted Circuit Design<!-- --> <span style=\"margin-left:5px\">(3)</span></span></li><li><span><a href=\"#/courses/view/60ca6b4602fd3a473f6d8425\" target=\"_blank\">EEL4783</a> <!-- -->-<!-- --> <!-- -->Hardware Description Languages in Digital Systems Design<!-- --> <span style=\"margin-left:5px\">(3)</span></span></li><li><span><a href=\"#/courses/view/60ca6b4a00f82712b7140e82\" target=\"_blank\">EEL5722C</a> <!-- -->-<!-- --> <!-- -->Field-Programmable Gate Array (FPGA) Design<!-- --> <span style=\"margin-left:5px\">(3)</span></span></li><li><span><a href=\"#/courses/view/618ad5bec271b5c747038e61\" target=\"_blank\">CIS4364</a> <!-- -->-<!-- --> <!-- -->Cyber Defense Analysis<!-- --> <span style=\"margin-left:5px\">(3)</span></span></li></ul></div></div></li></ul></div></div></section><h3>Grand Total Credits:<!-- --> <strong>39 - 43</strong></h3></div><h3><br />Foreign Language Requirements</h3> <hr /> <ul> <li> <p>None</p> </li> </ul> <h2><br /><br />Total Undergraduate Credit Hours Required: 39</h2> <hr /> <h3><br /><br />Other Requirements</h3> <hr /> <ul> <li>A grade of "C" (2.0) or better is required in each course toward this certificate.</li> <li>A student may not earn both the Cyber Operations Certificate and the Secure Computing and Networks Minor.</li> <li>Total hours required may vary based on courses selected to meet requirements.</li> </ul>",
"primary": false,
"program": 1047,
"update_url": "https://search.cm.ucf.edu/api/v1/descriptions/291112/?format=api"
}
],
"credit_hours": 39,
"online": false,
"has_online": false,
"profiles": [
{
"profile_type": {
"id": 1,
"name": "Main Site",
"root_url": "https://www.ucf.edu/degree-search/"
},
"url": "https://www.ucf.edu/degree/cyber-operations-certificate/",
"primary": true,
"program": 1047,
"update_url": "https://search.cm.ucf.edu/api/v1/profiles/717/?format=api"
}
],
"primary_profile_url": "https://www.ucf.edu/degree/cyber-operations-certificate/",
"plan_code": "CYBROPSCRT",
"subplan_code": null,
"catalog_url": "https://www.ucf.edu/catalog/undergraduate/#/programs/HJp41bOou",
"colleges": [
{
"name": "College of Engineering and Computer Science",
"full_name": "College of Engineering and Computer Science",
"short_name": "ENGR",
"college_url": "https://www.cecs.ucf.edu/",
"profile_url": "https://www.ucf.edu/college/engineering-computer-science/",
"update_url": "https://search.cm.ucf.edu/api/v1/colleges/3/?format=api"
}
],
"departments": [
{
"name": "Computer Science",
"full_name": "Computer Science",
"department_url": null,
"school": false,
"update_url": "https://search.cm.ucf.edu/api/v1/departments/30/?format=api"
}
],
"level": "Certificate",
"career": "Undergraduate",
"degree": "CER",
"parent_program": null,
"subplans": [],
"resident_tuition": null,
"nonresident_tuition": null,
"tuition_type": null,
"outcomes": "https://search.cm.ucf.edu/api/v1/programs/1047/outcomes/?format=api",
"projection_totals": "https://search.cm.ucf.edu/api/v1/programs/1047/projections/?format=api",
"careers": "https://search.cm.ucf.edu/api/v1/programs/1047/careers/?format=api",
"application_deadlines": "https://search.cm.ucf.edu/api/v1/programs/1047/deadlines/?format=api",
"graduate_slate_id": null,
"valid": true,
"has_locations": true,
"active": true,
"start_term": {
"full_name": "Summer 2016",
"semester": "Summer",
"semester_index": 1,
"year": 2016
},
"excerpt": "This certificate distinguishes those students with special training in cyber operations. Recommended for students majoring in Computer Science, Information Technology, and Computer Engineering seeking additional...",
"area_of_interest": "Computer And Information Sciences And Support Services.",
"subarea_of_interest": "Computer/Information Technology Administration And Management.",
"highlights": [],
"quotes": []
}