{"id":460,"date":"2023-01-31T21:37:12","date_gmt":"2023-01-31T21:37:12","guid":{"rendered":"https:\/\/dornsife.usc.edu\/poir\/?page_id=460"},"modified":"2025-04-23T11:19:30","modified_gmt":"2025-04-23T18:19:30","slug":"intelligence-and-cyber-operations","status":"publish","type":"page","link":"https:\/\/dornsife.usc.edu\/poir\/intelligence-and-cyber-operations\/","title":{"rendered":"Intelligence and Cyber Operations B.A."},"content":{"rendered":"  \n    \n\n\n\n\n\n\n<div\n  class=\"cc--component-container cc--intro-text align-center\"\n\n  \n  \n  \n  \n  \n  \n  >\n  <div class=\"c--component c--intro-text\"\n    \n      >\n\n    \n          \n<div class=\"f--field f--section-title\">\n\n    \n  <h2>\n          Combining Scholarship in International Relations Together with Technical Expertise in Applied Computing.\n      <\/h2>\n\n\n<\/div>\n  \n          \n<div class=\"f--field f--description\">\n\n    \n  <p>How have nation-states and other actors used cyber technology to collect information and to spread misinformation? How can we protect against it? Dornsife College and the Viterbi School of Engineering have collaborated to create a major that can help prepare students to engage these timely challenges and opportunities.<\/p>\n\n\n\n<\/div>\n  \n\n  <\/div><\/div>\n\n\n\n\n\n\n                \n  \n    \n\n\n\n\n\n\n<div\n  class=\"cc--component-container cc--accordions \"\n\n  \n  \n  \n  \n  \n  \n  >\n  <div class=\"c--component c--accordions\"\n    \n      >\n\n    \n      <div class=\"header-container\">\n\n                  \n<div class=\"f--field f--section-title\">\n\n    \n  <h2>\n          Program Overview\n      <\/h2>\n\n\n<\/div>\n      \n                  \n<div class=\"f--field f--description\">\n\n    \n  <p>This interdisciplinary major requires 51-54 units in total: 12 at the lower-division level\u00a0<span class=\"acalog-highlight-search-2\">and<\/span>\u00a039-42 at the upper-division level.<\/p>\n<p>During Spring 2020, INCO students presented their cyber crime knowledge to perspective employers across the globe in a virtual mock trial. Read more about it on <a href=\"http:\/\/news.usc.edu\/170055\/usc-students-cybercrime-digital-forensics-virtual-courtroom\/\">USC News<\/a>.<\/p>\n\n\n\n<\/div>\n      \n      \n    <\/div>\n  \n      <ul>\n              <li>\n          <button type=\"button\" class=\"accordion-trigger \" id=\"heading-1-1-i_WIKGwJM_\" aria-controls=\"section-1-1-i_WIKGwJM_\" aria-expanded=\"false\" aria-disabled=\"false\">\n                          <span class=\"item-title\">STEM Designated Program (New!)<\/span>\n            \n                      <\/button>\n\n          <div id=\"section-1-1-i_WIKGwJM_\" role=\"region\" aria-labelledby=\"heading-1-1-i_WIKGwJM_\" class=\"accordion-panel\">\n\n                            \n    \n\n\n\n\n\n\n<div\n  class=\"cc--component-container cc--rich-text \"\n\n  \n  \n  \n  \n  \n  \n  >\n  <div class=\"c--component c--rich-text\"\n    \n      >\n\n    \n      \n<div class=\"f--field f--wysiwyg\">\n\n    \n  <p>The Bachelor of Arts in Intelligence and Cyber Operations at USC is a STEM-designated program, which allows international students on F-1 visas to apply for a 24-month extension of their optional practical training (OPT).<\/p>\n\n\n\n<\/div>\n\n\n  <\/div><\/div>\n            \n                      <\/div>\n        <\/li>\n\n              <li>\n          <button type=\"button\" class=\"accordion-trigger \" id=\"heading-1-2-i_WIKGwJM_\" aria-controls=\"section-1-2-i_WIKGwJM_\" aria-expanded=\"false\" aria-disabled=\"false\">\n                          <span class=\"item-title\">Lower Division Required Courses (12 units)<\/span>\n            \n                      <\/button>\n\n          <div id=\"section-1-2-i_WIKGwJM_\" role=\"region\" aria-labelledby=\"heading-1-2-i_WIKGwJM_\" class=\"accordion-panel\">\n\n                            \n    \n\n\n\n\n\n\n<div\n  class=\"cc--component-container cc--rich-text \"\n\n  \n  \n  \n  \n  \n  \n  >\n  <div class=\"c--component c--rich-text\"\n    \n      >\n\n    \n      \n<div class=\"f--field f--wysiwyg\">\n\n    \n  <p><a href=\"https:\/\/catalogue.usc.edu\/preview_program.php?catoid=12&amp;poid=13476&amp;hl=intelligence+and+cyber+operations&amp;returnto=search\">IR 210gw International Relations: Introductory Analysis\u00a0\u00a0<\/a>Units: 4<\/p>\n<p><a href=\"https:\/\/catalogue.usc.edu\/preview_program.php?catoid=12&amp;poid=13476&amp;hl=intelligence+and+cyber+operations&amp;returnto=search\">TAC 125L From Hackers to CEOs: Introduction to Information Security\u00a0 <\/a>Units: 2<\/p>\n<p><a href=\"https:\/\/catalogue.usc.edu\/preview_program.php?catoid=12&amp;poid=13476&amp;hl=intelligence+and+cyber+operations&amp;returnto=search\">TAC 115 Programming in Python\u00a0 <\/a>Units: 2 OR TAC<a href=\"https:\/\/catalogue.usc.edu\/preview_program.php?catoid=12&amp;poid=13476&amp;hl=intelligence+and+cyber+operations&amp;returnto=search\"> 165 Introduction to C++ Programming\u00a0\u00a0<\/a>Units: 2<\/p>\n<p><a href=\"https:\/\/catalogue.usc.edu\/preview_program.php?catoid=12&amp;poid=13476&amp;hl=intelligence+and+cyber+operations&amp;returnto=search\">IR 213 The Global Economy\u00a0\u00a0<\/a>Units: 4\u00a0 OR\u00a0<a href=\"https:\/\/catalogue.usc.edu\/preview_program.php?catoid=12&amp;poid=13476&amp;hl=intelligence+and+cyber+operations&amp;returnto=search\">ECON 203g Principles of Microeconomics\u00a0\u00a0<\/a>Units: 4<\/p>\n\n\n\n<\/div>\n\n\n  <\/div><\/div>\n            \n                      <\/div>\n        <\/li>\n\n              <li>\n          <button type=\"button\" class=\"accordion-trigger \" id=\"heading-1-3-i_WIKGwJM_\" aria-controls=\"section-1-3-i_WIKGwJM_\" aria-expanded=\"false\" aria-disabled=\"false\">\n                          <span class=\"item-title\">Upper Division Required Courses (16 units)<\/span>\n            \n                      <\/button>\n\n          <div id=\"section-1-3-i_WIKGwJM_\" role=\"region\" aria-labelledby=\"heading-1-3-i_WIKGwJM_\" class=\"accordion-panel\">\n\n                            \n    \n\n\n\n\n\n\n<div\n  class=\"cc--component-container cc--rich-text \"\n\n  \n  \n  \n  \n  \n  \n  >\n  <div class=\"c--component c--rich-text\"\n    \n      >\n\n    \n      \n<div class=\"f--field f--wysiwyg\">\n\n    \n  <p><a href=\"https:\/\/catalogue.usc.edu\/preview_program.php?catoid=12&amp;poid=13476&amp;hl=intelligence+and+cyber+operations&amp;returnto=search\">IR 304 National\u00a0<span class=\"acalog-highlight-search-1\">Intelligence<\/span>\u00a0<span class=\"acalog-highlight-search-2\">and<\/span>\u00a0the Shaping of Policy\u00a0\u00a0<\/a>Units: 4<\/p>\n<p><a href=\"https:\/\/catalogue.usc.edu\/preview_program.php?catoid=12&amp;poid=13476&amp;hl=intelligence+and+cyber+operations&amp;returnto=search\">IR 320 Technology\u00a0<span class=\"acalog-highlight-search-2\">and<\/span>\u00a0International Relations\u00a0\u00a0<\/a>Units: 4<\/p>\n<p><a href=\"https:\/\/catalogue.usc.edu\/preview_program.php?catoid=12&amp;poid=13476&amp;hl=intelligence+and+cyber+operations&amp;returnto=search\">TAC 325 Ethical Hacking <span class=\"acalog-highlight-search-2\">and<\/span>\u00a0Systems Defense\u00a0\u00a0<\/a>Units: 4<\/p>\n<p><a href=\"https:\/\/catalogue.usc.edu\/preview_program.php?catoid=12&amp;poid=13476&amp;hl=intelligence+and+cyber+operations&amp;returnto=search\">TAC 375 Digital Forensics\u00a0 <\/a>Units: 4<\/p>\n\n\n\n<\/div>\n\n\n  <\/div><\/div>\n            \n                      <\/div>\n        <\/li>\n\n              <li>\n          <button type=\"button\" class=\"accordion-trigger \" id=\"heading-1-4-i_WIKGwJM_\" aria-controls=\"section-1-4-i_WIKGwJM_\" aria-expanded=\"false\" aria-disabled=\"false\">\n                          <span class=\"item-title\">Security and Violence (4 units)<\/span>\n            \n                      <\/button>\n\n          <div id=\"section-1-4-i_WIKGwJM_\" role=\"region\" aria-labelledby=\"heading-1-4-i_WIKGwJM_\" class=\"accordion-panel\">\n\n                            \n    \n\n\n\n\n\n\n<div\n  class=\"cc--component-container cc--rich-text \"\n\n  \n  \n  \n  \n  \n  \n  >\n  <div class=\"c--component c--rich-text\"\n    \n      >\n\n    \n      \n<div class=\"f--field f--wysiwyg\">\n\n    \n  <h5>Choose one:<\/h5>\n<p><a href=\"https:\/\/catalogue.usc.edu\/preview_program.php?catoid=12&amp;poid=13476&amp;hl=intelligence+and+cyber+operations&amp;returnto=search\">IR 313 Religions\u00a0<span class=\"acalog-highlight-search-2\">and<\/span>\u00a0Political Violence\u00a0\u00a0<\/a>Units: 4<\/p>\n<p><a href=\"https:\/\/catalogue.usc.edu\/preview_program.php?catoid=12&amp;poid=13476&amp;hl=intelligence+and+cyber+operations&amp;returnto=search\">IR 315 Ethnicity\u00a0<span class=\"acalog-highlight-search-2\">and<\/span>\u00a0Nationalism in World Politics\u00a0\u00a0<\/a>Units: 4<\/p>\n<p><a href=\"https:\/\/catalogue.usc.edu\/preview_program.php?catoid=12&amp;poid=13476&amp;hl=intelligence+and+cyber+operations&amp;returnto=search\">IR 318 Violent Conflict\u00a0\u00a0<\/a>Units: 4<\/p>\n<p><a href=\"https:\/\/catalogue.usc.edu\/preview_program.php?catoid=12&amp;poid=13476&amp;hl=intelligence+and+cyber+operations&amp;returnto=search\">IR 319 Human Security\u00a0<span class=\"acalog-highlight-search-2\">and<\/span>\u00a0Humanitarian Intervention\u00a0\u00a0<\/a>Units: 4<\/p>\n<p><a href=\"https:\/\/catalogue.usc.edu\/preview_program.php?catoid=12&amp;poid=13476&amp;hl=intelligence+and+cyber+operations&amp;returnto=search\">IR 342 The Politics\u00a0<span class=\"acalog-highlight-search-2\">and<\/span>\u00a0Strategy of Weapons of Mass Destruction\u00a0\u00a0<\/a>Units: 4<\/p>\n<p><a href=\"https:\/\/catalogue.usc.edu\/preview_program.php?catoid=12&amp;poid=13476&amp;hl=intelligence+and+cyber+operations&amp;returnto=search\">IR 381 Introduction to International Security\u00a0\u00a0<\/a>Units: 4<\/p>\n<p><a href=\"https:\/\/catalogue.usc.edu\/preview_program.php?catoid=12&amp;poid=13476&amp;hl=intelligence+and+cyber+operations&amp;returnto=search\">IR 386 Terrorism\u00a0<span class=\"acalog-highlight-search-2\">and<\/span>\u00a0Counterterrorism\u00a0\u00a0<\/a>Units: 4<\/p>\n<p><a href=\"https:\/\/catalogue.usc.edu\/preview_program.php?catoid=12&amp;poid=13476&amp;hl=intelligence+and+cyber+operations&amp;returnto=search\">IR 387 Strategic Studies\u00a0\u00a0<\/a>Units: 4<\/p>\n\n\n\n<\/div>\n\n\n  <\/div><\/div>\n            \n                      <\/div>\n        <\/li>\n\n              <li>\n          <button type=\"button\" class=\"accordion-trigger \" id=\"heading-1-5-i_WIKGwJM_\" aria-controls=\"section-1-5-i_WIKGwJM_\" aria-expanded=\"false\" aria-disabled=\"false\">\n                          <span class=\"item-title\">International Finance (4 units)<\/span>\n            \n                      <\/button>\n\n          <div id=\"section-1-5-i_WIKGwJM_\" role=\"region\" aria-labelledby=\"heading-1-5-i_WIKGwJM_\" class=\"accordion-panel\">\n\n                            \n    \n\n\n\n\n\n\n<div\n  class=\"cc--component-container cc--rich-text \"\n\n  \n  \n  \n  \n  \n  \n  >\n  <div class=\"c--component c--rich-text\"\n    \n      >\n\n    \n      \n<div class=\"f--field f--wysiwyg\">\n\n    \n  <h5>Choose one:<\/h5>\n<p><a href=\"https:\/\/catalogue.usc.edu\/preview_program.php?catoid=12&amp;poid=13476&amp;hl=intelligence+and+cyber+operations&amp;returnto=search\">ECON 452 International Finance\u00a0\u00a0<\/a>Units: 4<br \/>\n(Prerequisite:\u00a0<a id=\"tt5283\" href=\"https:\/\/catalogue.usc.edu\/preview_program.php?catoid=12&amp;poid=13476&amp;hl=intelligence+and+cyber+operations&amp;returnto=search#tt5283\" rel=\"\/ajax\/preview_course.php?catoid=12&amp;coid=179162&amp;display_options[location]=tooltip&amp;show noopener remote\">ECON 305<\/a>)<\/p>\n<p><a href=\"https:\/\/catalogue.usc.edu\/preview_program.php?catoid=12&amp;poid=13476&amp;hl=intelligence+and+cyber+operations&amp;returnto=search\">ECON 457 Financial Markets\u00a0\u00a0<\/a>Units: 4<br \/>\n(Prerequisite:\u00a0<a id=\"tt897\" href=\"https:\/\/catalogue.usc.edu\/preview_program.php?catoid=12&amp;poid=13476&amp;hl=intelligence+and+cyber+operations&amp;returnto=search#tt897\" rel=\"\/ajax\/preview_course.php?catoid=12&amp;coid=179161&amp;display_options[location]=tooltip&amp;show noopener remote\">ECON 303<\/a>)<\/p>\n<p><a href=\"https:\/\/catalogue.usc.edu\/preview_program.php?catoid=12&amp;poid=13476&amp;hl=intelligence+and+cyber+operations&amp;returnto=search\">IR 328 The Evolving Global Economic Architecture-Capital Mobility\u00a0\u00a0<\/a>Units: 4<\/p>\n<p><a href=\"https:\/\/catalogue.usc.edu\/preview_program.php?catoid=12&amp;poid=13476&amp;hl=intelligence+and+cyber+operations&amp;returnto=search\">IR 329 The Global Finance\u00a0<span class=\"acalog-highlight-search-2\">and<\/span>\u00a0Monetary Regime\u00a0\u00a0<\/a>Units: 4<\/p>\n<p><a href=\"https:\/\/catalogue.usc.edu\/preview_program.php?catoid=12&amp;poid=13476&amp;hl=intelligence+and+cyber+operations&amp;returnto=search\">IR 431 Commercial\u00a0<span class=\"acalog-highlight-search-2\">and<\/span>\u00a0Financial Globalization-Trends, Challenges\u00a0\u00a0<\/a>Units: 4<\/p>\n\n\n\n<\/div>\n\n\n  <\/div><\/div>\n            \n                      <\/div>\n        <\/li>\n\n              <li>\n          <button type=\"button\" class=\"accordion-trigger \" id=\"heading-1-6-i_WIKGwJM_\" aria-controls=\"section-1-6-i_WIKGwJM_\" aria-expanded=\"false\" aria-disabled=\"false\">\n                          <span class=\"item-title\">Cyber Law, Policy Management (4 units)<\/span>\n            \n                      <\/button>\n\n          <div id=\"section-1-6-i_WIKGwJM_\" role=\"region\" aria-labelledby=\"heading-1-6-i_WIKGwJM_\" class=\"accordion-panel\">\n\n                            \n    \n\n\n\n\n\n\n<div\n  class=\"cc--component-container cc--rich-text \"\n\n  \n  \n  \n  \n  \n  \n  >\n  <div class=\"c--component c--rich-text\"\n    \n      >\n\n    \n      \n<div class=\"f--field f--wysiwyg\">\n\n    \n  <h5>Choose one:<\/h5>\n<p><a href=\"https:\/\/catalogue.usc.edu\/preview_program.php?catoid=12&amp;poid=13476&amp;hl=intelligence+and+cyber+operations&amp;returnto=search\">DSCI 429 Security\u00a0<span class=\"acalog-highlight-search-2\">and<\/span>\u00a0Privacy\u00a0\u00a0<\/a>Units: 4<\/p>\n<p><a href=\"https:\/\/catalogue.usc.edu\/preview_program.php?catoid=12&amp;poid=13476&amp;hl=intelligence+and+cyber+operations&amp;returnto=search\">TAC 370 Information Security Management\u00a0 <\/a>Units: 4<\/p>\n<p><a href=\"https:\/\/catalogue.usc.edu\/preview_program.php?catoid=12&amp;poid=13476&amp;hl=intelligence+and+cyber+operations&amp;returnto=search\">TAC 479 <span class=\"acalog-highlight-search-3\">Cyber<\/span>\u00a0Law\u00a0<span class=\"acalog-highlight-search-2\">and<\/span>\u00a0Privacy\u00a0\u00a0<\/a>Units: 4<\/p>\n\n\n\n<\/div>\n\n\n  <\/div><\/div>\n            \n                      <\/div>\n        <\/li>\n\n              <li>\n          <button type=\"button\" class=\"accordion-trigger \" id=\"heading-1-7-i_WIKGwJM_\" aria-controls=\"section-1-7-i_WIKGwJM_\" aria-expanded=\"false\" aria-disabled=\"false\">\n                          <span class=\"item-title\">Technical Elective (8 Units)<\/span>\n            \n                      <\/button>\n\n          <div id=\"section-1-7-i_WIKGwJM_\" role=\"region\" aria-labelledby=\"heading-1-7-i_WIKGwJM_\" class=\"accordion-panel\">\n\n                            \n    \n\n\n\n\n\n\n<div\n  class=\"cc--component-container cc--rich-text \"\n\n  \n  \n  \n  \n  \n  \n  >\n  <div class=\"c--component c--rich-text\"\n    \n      >\n\n    \n      \n<div class=\"f--field f--wysiwyg\">\n\n    \n  <h5>Choose two:<\/h5>\n<p><a href=\"https:\/\/catalogue.usc.edu\/preview_program.php?catoid=12&amp;poid=13476&amp;hl=intelligence+and+cyber+operations&amp;returnto=search\">TAC 303 Full-Stack Web Development\u00a0 <\/a>Units: 4<\/p>\n<p><a href=\"https:\/\/catalogue.usc.edu\/preview_program.php?catoid=12&amp;poid=13476&amp;hl=intelligence+and+cyber+operations&amp;returnto=search\">TAC 357 Enterprise Network Design\u00a0 <\/a>Units: 4<\/p>\n<p><a href=\"https:\/\/catalogue.usc.edu\/preview_program.php?catoid=12&amp;poid=13476&amp;hl=intelligence+and+cyber+operations&amp;returnto=search\">TAC 365 Managing Data in C++\u00a0 <\/a>Units: 4<\/p>\n<p><a href=\"https:\/\/catalogue.usc.edu\/preview_program.php?catoid=12&amp;poid=13476&amp;hl=intelligence+and+cyber+operations&amp;returnto=search\">TAC 425 Web Application Security\u00a0 <\/a>Units: 4<\/p>\n<p><a href=\"https:\/\/catalogue.usc.edu\/preview_program.php?catoid=12&amp;poid=13476&amp;hl=intelligence+and+cyber+operations&amp;returnto=search\">TAC 445: Apple Forensics and Security (macOS and iOS) Units: 4<\/a><\/p>\n<p><a href=\"https:\/\/catalogue.usc.edu\/preview_program.php?catoid=12&amp;poid=13476&amp;hl=intelligence+and+cyber+operations&amp;returnto=search\">TAC 446 <span class=\"acalog-highlight-search-3\">Cyber<\/span>\u00a0Breach Investigations\u00a0\u00a0<\/a>Units: 3<\/p>\n<p><a href=\"https:\/\/catalogue.usc.edu\/preview_program.php?catoid=12&amp;poid=13476&amp;hl=intelligence+and+cyber+operations&amp;returnto=search\">TAC 457 Network Security\u00a0 <\/a>Units: 4<\/p>\n<p><a href=\"https:\/\/catalogue.usc.edu\/preview_program.php?catoid=12&amp;poid=13476&amp;hl=intelligence+and+cyber+operations&amp;returnto=search\">TAC 475 Advanced Digital Forensics\u00a0 <\/a>Units: 4<\/p>\n\n\n\n<\/div>\n\n\n  <\/div><\/div>\n            \n                      <\/div>\n        <\/li>\n\n              <li>\n          <button type=\"button\" class=\"accordion-trigger \" id=\"heading-1-8-i_WIKGwJM_\" aria-controls=\"section-1-8-i_WIKGwJM_\" aria-expanded=\"false\" aria-disabled=\"false\">\n                          <span class=\"item-title\">Regional Electives (8 units)<\/span>\n            \n                      <\/button>\n\n          <div id=\"section-1-8-i_WIKGwJM_\" role=\"region\" aria-labelledby=\"heading-1-8-i_WIKGwJM_\" class=\"accordion-panel\">\n\n                            \n    \n\n\n\n\n\n\n<div\n  class=\"cc--component-container cc--rich-text \"\n\n  \n  \n  \n  \n  \n  \n  >\n  <div class=\"c--component c--rich-text\"\n    \n      >\n\n    \n      \n<div class=\"f--field f--wysiwyg\">\n\n    \n  <h4>Choose two courses, each from a different category:<\/h4>\n<h5>The Middle East<\/h5>\n<p><a href=\"https:\/\/catalogue.usc.edu\/preview_program.php?catoid=12&amp;poid=13476&amp;hl=intelligence+and+cyber+operations&amp;returnto=search\">HIST 384 Popular Culture in the Middle East\u00a0\u00a0<\/a>Units: 4<\/p>\n<p><a href=\"https:\/\/catalogue.usc.edu\/preview_program.php?catoid=12&amp;poid=13476&amp;hl=intelligence+and+cyber+operations&amp;returnto=search\">IR 362 The International Relations of the Contemporary Middle East\u00a0\u00a0<\/a>Units: 4<\/p>\n<p><a href=\"https:\/\/catalogue.usc.edu\/preview_program.php?catoid=12&amp;poid=13476&amp;hl=intelligence+and+cyber+operations&amp;returnto=search\">IR 463 Islam\u00a0<span class=\"acalog-highlight-search-2\">and<\/span>\u00a0Arab Nationalism\u00a0\u00a0<\/a>Units: 4<\/p>\n<p><a href=\"https:\/\/catalogue.usc.edu\/preview_program.php?catoid=12&amp;poid=13476&amp;hl=intelligence+and+cyber+operations&amp;returnto=search\">MDES 340 The United States\u00a0<span class=\"acalog-highlight-search-2\">and<\/span>\u00a0the Middle East\u00a0\u00a0<\/a>Units: 4<\/p>\n<p><a href=\"https:\/\/catalogue.usc.edu\/preview_program.php?catoid=12&amp;poid=13476&amp;hl=intelligence+and+cyber+operations&amp;returnto=search\">REL 402 Cultural Heritage, Religion,\u00a0<span class=\"acalog-highlight-search-2\">and<\/span>\u00a0Politics in the Middle East\u00a0\u00a0<\/a>Units: 4<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Russia, Eastern Europe and Eurasia<\/strong><\/p>\n<p><a href=\"https:\/\/catalogue.usc.edu\/preview_program.php?catoid=12&amp;poid=13476&amp;hl=intelligence+and+cyber+operations&amp;returnto=search\">IR 345 Russian\u00a0<span class=\"acalog-highlight-search-2\">and<\/span>\u00a0Post-Soviet Foreign Policy\u00a0\u00a0<\/a>Units: 4<\/p>\n<p><a href=\"https:\/\/catalogue.usc.edu\/preview_program.php?catoid=12&amp;poid=13476&amp;hl=intelligence+and+cyber+operations&amp;returnto=search\">IR 346 Communism\u00a0<span class=\"acalog-highlight-search-2\">and<\/span>\u00a0Post-Communism: Eastern Europe\u00a0<span class=\"acalog-highlight-search-2\">and<\/span>\u00a0the Balkans\u00a0\u00a0<\/a>Units: 4<\/p>\n<p><a href=\"https:\/\/catalogue.usc.edu\/preview_program.php?catoid=12&amp;poid=13476&amp;hl=intelligence+and+cyber+operations&amp;returnto=search\">IR 438 Nationalism\u00a0<span class=\"acalog-highlight-search-2\">and<\/span>\u00a0Ethnic Conflict after Communism\u00a0\u00a0<\/a>Units: 4<\/p>\n<p><a href=\"https:\/\/catalogue.usc.edu\/preview_program.php?catoid=12&amp;poid=13476&amp;hl=intelligence+and+cyber+operations&amp;returnto=search\">IR 439 Political Economy of Russia\u00a0<span class=\"acalog-highlight-search-2\">and<\/span>\u00a0Eurasia\u00a0\u00a0<\/a>Units: 4<\/p>\n<p>&nbsp;<\/p>\n<h5><strong>East Asia<\/strong><\/h5>\n<p><a href=\"https:\/\/catalogue.usc.edu\/preview_program.php?catoid=12&amp;poid=13476&amp;hl=intelligence+and+cyber+operations&amp;returnto=search\">HIST 366 The People\u2019s Republic of China\u00a0\u00a0<\/a>Units: 4<\/p>\n<p><a href=\"https:\/\/catalogue.usc.edu\/preview_program.php?catoid=12&amp;poid=13476&amp;hl=intelligence+and+cyber+operations&amp;returnto=search\">IR 333 China in International Affairs\u00a0\u00a0<\/a>Units: 4<\/p>\n<p><a href=\"https:\/\/catalogue.usc.edu\/preview_program.php?catoid=12&amp;poid=13476&amp;hl=intelligence+and+cyber+operations&amp;returnto=search\">IR 340 The Political Economy of China\u00a0\u00a0<\/a>Units: 4<\/p>\n<p><a href=\"https:\/\/catalogue.usc.edu\/preview_program.php?catoid=12&amp;poid=13476&amp;hl=intelligence+and+cyber+operations&amp;returnto=search\">IR 360 International Relations of the Pacific Rim\u00a0\u00a0<\/a>Units: 4<\/p>\n<p><a href=\"https:\/\/catalogue.usc.edu\/preview_program.php?catoid=12&amp;poid=13476&amp;hl=intelligence+and+cyber+operations&amp;returnto=search\">IR 384 Asian Security Issues\u00a0\u00a0<\/a>Units: 4<\/p>\n\n\n\n<\/div>\n\n\n  <\/div><\/div>\n            \n                      <\/div>\n        <\/li>\n\n          <\/ul>\n  \n  \n\n  <\/div><\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":142,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-content-detail.php","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-460","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Intelligence and Cyber Operations B.A. - Department of Political Science and International Relations<\/title>\n<meta name=\"description\" content=\"USC intelligence and cyber operations\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/dornsife.usc.edu\/poir\/intelligence-and-cyber-operations\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Intelligence and Cyber Operations B.A. - Department of Political Science and International Relations\" \/>\n<meta property=\"og:description\" content=\"USC intelligence and cyber operations\" \/>\n<meta property=\"og:url\" content=\"https:\/\/dornsife.usc.edu\/poir\/intelligence-and-cyber-operations\/\" \/>\n<meta property=\"og:site_name\" content=\"Department of Political Science and International Relations\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/USCPOIR\/\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-23T18:19:30+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@uscpoir\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/dornsife.usc.edu\/poir\/intelligence-and-cyber-operations\/\",\"url\":\"https:\/\/dornsife.usc.edu\/poir\/intelligence-and-cyber-operations\/\",\"name\":\"Intelligence and Cyber Operations B.A. - Department of Political Science and International Relations\",\"isPartOf\":{\"@id\":\"https:\/\/live-usc-dornsife.pantheonsite.io\/poir\/#website\"},\"datePublished\":\"2023-01-31T21:37:12+00:00\",\"dateModified\":\"2025-04-23T18:19:30+00:00\",\"description\":\"USC intelligence and cyber operations\",\"breadcrumb\":{\"@id\":\"https:\/\/dornsife.usc.edu\/poir\/intelligence-and-cyber-operations\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/dornsife.usc.edu\/poir\/intelligence-and-cyber-operations\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/dornsife.usc.edu\/poir\/intelligence-and-cyber-operations\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/dornsife.usc.edu\/poir\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Intelligence and Cyber Operations B.A.\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/live-usc-dornsife.pantheonsite.io\/poir\/#website\",\"url\":\"https:\/\/live-usc-dornsife.pantheonsite.io\/poir\/\",\"name\":\"Department of Political Science and International Relations\",\"description\":\"USC Dornsife Department of Political Science and International Relations\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/live-usc-dornsife.pantheonsite.io\/poir\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Intelligence and Cyber Operations B.A. - Department of Political Science and International Relations","description":"USC intelligence and cyber operations","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/dornsife.usc.edu\/poir\/intelligence-and-cyber-operations\/","og_locale":"en_US","og_type":"article","og_title":"Intelligence and Cyber Operations B.A. - Department of Political Science and International Relations","og_description":"USC intelligence and cyber operations","og_url":"https:\/\/dornsife.usc.edu\/poir\/intelligence-and-cyber-operations\/","og_site_name":"Department of Political Science and International Relations","article_publisher":"https:\/\/www.facebook.com\/USCPOIR\/","article_modified_time":"2025-04-23T18:19:30+00:00","twitter_card":"summary_large_image","twitter_site":"@uscpoir","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/dornsife.usc.edu\/poir\/intelligence-and-cyber-operations\/","url":"https:\/\/dornsife.usc.edu\/poir\/intelligence-and-cyber-operations\/","name":"Intelligence and Cyber Operations B.A. - Department of Political Science and International Relations","isPartOf":{"@id":"https:\/\/live-usc-dornsife.pantheonsite.io\/poir\/#website"},"datePublished":"2023-01-31T21:37:12+00:00","dateModified":"2025-04-23T18:19:30+00:00","description":"USC intelligence and cyber operations","breadcrumb":{"@id":"https:\/\/dornsife.usc.edu\/poir\/intelligence-and-cyber-operations\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/dornsife.usc.edu\/poir\/intelligence-and-cyber-operations\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/dornsife.usc.edu\/poir\/intelligence-and-cyber-operations\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/dornsife.usc.edu\/poir\/"},{"@type":"ListItem","position":2,"name":"Intelligence and Cyber Operations B.A."}]},{"@type":"WebSite","@id":"https:\/\/live-usc-dornsife.pantheonsite.io\/poir\/#website","url":"https:\/\/live-usc-dornsife.pantheonsite.io\/poir\/","name":"Department of Political Science and International Relations","description":"USC Dornsife Department of Political Science and International Relations","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/live-usc-dornsife.pantheonsite.io\/poir\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/dornsife.usc.edu\/poir\/wp-json\/wp\/v2\/pages\/460","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dornsife.usc.edu\/poir\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/dornsife.usc.edu\/poir\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/dornsife.usc.edu\/poir\/wp-json\/wp\/v2\/users\/142"}],"replies":[{"embeddable":true,"href":"https:\/\/dornsife.usc.edu\/poir\/wp-json\/wp\/v2\/comments?post=460"}],"version-history":[{"count":52,"href":"https:\/\/dornsife.usc.edu\/poir\/wp-json\/wp\/v2\/pages\/460\/revisions"}],"predecessor-version":[{"id":7855,"href":"https:\/\/dornsife.usc.edu\/poir\/wp-json\/wp\/v2\/pages\/460\/revisions\/7855"}],"wp:attachment":[{"href":"https:\/\/dornsife.usc.edu\/poir\/wp-json\/wp\/v2\/media?parent=460"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}