Cybersecurity Certificate of Completion

Students seeking this certificate of completion will need to successfully complete:

(Click a course name below to view course details).

This course addresses the issues relating to successful information security management. Topics include access control systems, network and software security, management practices, risk management, protection mechanisms, business continuity planning, and legal and ethical issues. The course allows for analysis of current security management models.

In addition, students will select 9 credits (3 classes) from those below:

This course is designed as an overview of the investigative methods and tools associated with computer forensics. Topics include: processing crime and incident scenes, digital evidence controls, recovery of information, network forensics, data acquisition, and legal and ethical issues associated with investigations.

This course is designed as an overview of the fundamental processes associated with waging war in an electronic age. Topics include strategic planning and tactical analysis for target identification, reconnaissance, and tool selection. The intent of this course is to focus on individual, corporate and national forms of warfare.

This course focuses on the architecture and security associated with cloud computing. Emphasis in placed on key drivers which lead to cloud computing adoption and issues associated with cloud computing governance. Additional topics will include infrastructure security, identity and access management, cloud services, data security and storage, and auditing and compliance. Prerequisites: Graduate Standing

This course provides an introduction to the fundamental components of security architecture. Topics include computer organization; hardware, software and firmware components; open and distributed systems; and protection mechanisms. Discussion also includes certification and accreditation; formal security models; and evaluation criteria. Assigned projects include designing a model secure system.

This course provides a technical study of offensive and defensive techniques for protecting cyber assets. Topics include security testing, risk mitigation techniques, and threat response. Discussion also includes penetration testing theory, techniques, and tools; networks, systems, and application vulnerability scanning; risk analysis and response; and intrusion detection and response. Emphasis is placed on identification of system vulnerabilities and threats and techniques for preventing attacks.