The graduate will understand friendly, neutral, and adversarial cyber infrastructures and will be able to diagram and explain subsystem relationships, interactions, and functions. Additionally, the graduate will be able to analyze specific cyber system implementations to identify security and operational vulnerabilities and potential effects for defensive and offensive operations in both permissive and contested environments.
The graduate will be able to describe the administrative and operational structure and command relationships of the organizations and commands that will be operating in the cyberspace domain and illustrate the employment of these organizational relationships in an operational environment. Additionally, the graduate will be able to recall and apply strategy, policy, and authorities (ROE, US law, the Law of Armed Conflict, and national policy) as it pertains to CO.
Designed to prepare Ph.D. students for the advanced area of the Software Engineering written qualifying examination - software automation. It introduces the most important references from each subject areas, highlights the important issues in each area, and helps students become familiar with the Software Engineering research. Topics covered include: reducing coding efforts - program generation, synthesis techniques, static checking; computer-aided prototyping - models, languages, methods; software reuse - search methods, library organization; software evolution - models, automation methods, merging and slicing; domain specific systems - real-time systems. Intended for Software Engineering PhD students. Prerequisite: SW4931 or consent of instructor. Graded on Pass/Fail basis only.
This course provides an introduction to microeconomic theory designed to meet the needs of students in the GSB non-Economics PhD programs. The course will cover the standard economic models of individual decision-making, models of consumer behavior and producer behavior under perfect competition, the Arrow-Debreu general equilibrium model, and some basic issues in welfare measurement. This class assumes a basic knowledge of undergraduate intermediate microeconomics, comfort with multivariable calculus and linear algebra and some exposure to real analysis.
The Naval Postgraduate School, in collaboration with the Uniformed Services University of the Health Sciences, have collaborated to design and deliver a distance learning educational program for healthcare simulation professionals. This program focuses on the effective use of modeling and simulation in the healthcare domain. The materials developed have been reviewed and incorporated into an efficient, interactive, fast-paced certificate program for working professionals.
The MCT degree provides a graduate education for those in unique circumstances. State-of-the-art distance learning (DL) technology is used to bring the MCT program straight to the student on duty. With fully Web-based courses, there is no required "class time"-no need to get off the flight schedule, miss any watches, or adjust a duty schedule. MCT offers a seamless transition from duty station to duty station; when you move the program goes with the student, even on the road. For organizations that desire to sponsor groups of students, we can arrange to deliver courses at an accelerated pace via video tele-education (VTE), this option requires scheduled on-duty classroom time.
The MCT degree offers its graduates the knowledge and skills necessary to specify, evaluate, and manage computer system development, as well as the ability to provide technical guidance in the analysis, design, and application of software and firmware used in the Navy. The MCT program consists of 12 courses selected to provide breadth and depth in the latest computing technologies. Four courses provide a foundation in computing for those without a Computer Science background. Four specialization fundamentals courses provide breadth in computing technologies and techniques examined with respect to a consistent specialization theme, and the final four specialization depth courses develop strong expertise in the specialization area. A capstone paper completes the degree.
The Academic Certificate in Data Science provides education in distributed computing infrastructure and the application of statistical and machine learning techniques to appropriately manage and gain insights from data of all sizes and types. Data Science has emerged as an area critical to the mission of the Navy and the Department of Defense because of the central role it plays in intelligence, surveillance, and reconnaissance, talent management, cyber-security, and logistics functional areas. Upon successful completion of the course work, students will be awarded an Academic Certificate in keeping with standard practices of the Naval Postgraduate School.
MCT is an excellent fit for those officers and government service (GS) personnel whose career track would not otherwise lend itself to receiving a resident technical graduate education. Available anywhere in the world, at home, on detachment, and at sea.
The total number of NPS graduate credits obtained for the certificate is 13.5, where laboratory credits are counted as half. This certificate program can also be applied toward a master's degree program, e.g. Curriculum 368.
Using the foundation established through the Cyber Security Fundamentals certificate, students enrolled in Cyber Security Adversarial Techniques graduate certificate, will obtain a detailed understanding of and ability to function in real operational situations in which adversarial techniques are being used. An understanding of overarching principles, computer and network architectural concepts, and exemplar cases will allow students to analyze current and future malware. Students will learn how to use network traffic analysis to extract the characteristics of ongoing attacks and to identify exploitable vulnerabilities. They will learn how to decipher subtle, clandestine host-based attack mechanisms and how these mechanisms are inserted into target systems. They will learn, in detail, how attack and exploitation software mechanisms are built and deployed, including the distributed command and control techniques used to manage large-scale malware networks. Considerable programming and hands-on work with systems and networks will be required. Entire courses, or units within them, may be taught at the classified level, thus facilitating classroom discussions on emerging challenges and capabilities.
A baccalaureate degree, or the equivalent, with above average grades in mathematics, (including differential and integral calculus) resulting in an academic profile code (APC) of at least 325 is required. Undergraduate degrees in applied science or engineering are highly desirable. Students lacking these prerequisites may be acceptable for the program, providing their undergraduate records and/or other indicators of success, such as the Graduate Record Examination (GRE), indicate an ability to work in quantitative subjects. While previous academic or practical experience in computer science is certainly helpful and can enhance the applicant's potential for admission, such experience is not a prerequisite. Active/Active Duty Reserve U.S. military and GS personnel are eligible.