Certificate in Cybersecurity

Overview

The Certificate in Cybersecurity offers students the opportunity to explore concepts of information security principles, access controls, network security, and security operations as a way to start a career in cybersecurity. Cybersecurity Certificate students will be prepared for entry level professional certifications in the field of cybersecurity.

Student Learning Outcomes

Upon successful completion of this certificate, students will be equipped to:

  • Explain fundamental cybersecurity principles.
  • Articulate the importance of information governance policies, procedures, regulations, and laws.
  • Examine the incident response and mitigation process including business continuity, disaster recovery, and incident response concepts.
  • Describe physical and logical access controls.
  • Summarize network security concepts and threats and attacks.
  • Discuss best practices for creating cybersecurity policies, performing risk assessments, and security incident response handling.

Admission Requirements

All courses in the Cybersecurity Certificate must be completed and approved through the Adult Degree Program.

Transfer Credit

Transfer credit may be considered on a case-by-case basis after an application has been submitted.

Certificate Requirements

Complete the following:

Not all courses are offered every year. The certificate is successfully finished when all certificate courses are completed with grades of C- or better and a certificate GPA of 2.0 or above.
This course introduces students to the fundamental concepts of cybersecurity. Students explore the safeguards and countermeasures prescribed for an information system to protect the confidentiality, integrity, and availability of the system and its information. Students will learn about the threats and vulnerabilities facing computer systems and the tools and techniques used to secure them.
This course introduces students to computer networking and network security concepts, including the types of networks and devices. Course concepts also include a detailed look at the types of access controls, including physical and logical controls.
This course focuses on the importance of maintaining availability of system operations during unplanned disruptions. Students learn concepts related to each of the three distinct plans that are vital to the survival of any organization facing out-of-the-ordinary operating conditions. In this course, students will examine the incident response and mitigation process including business continuity, disaster recovery, and incident response concepts.
This course provides students with knowledge on the day-to-day operations of a security program, including the use of security controls and risk mitigation strategies of an organization. Students will learn about best practices in securing data, such as data encryption, configuration management, implementation of security policies, and security awareness training.