Cybersecurity Certificate
About the Cybersecurity Certificate
Not all heroes wear capes! By enrolling in our Cybersecurity Certificate, you'll have the opportunity to acquire the skills necessary to detect and protect sensitive data and personal information from malicious attacks, theft and damage.
Recent data breaches in prominent corporations and government agencies have highlighted how vital sound cybersecurity policies are. With the sheer volume of data being stored increasing, and hackers becoming increasingly sophisticated, the demand for cybersecurity specialists has never been more pressing.
Our courses are readily available on demand, allowing you to learn at your own pace and in your preferred space. This allows you to design a schedule that aligns with your unique needs and preferences.
So, why not take the first step towards becoming one of these vital heroes? Sign up today!
Program Content
Course Descriptions
Communications and Network Security
It begins with a lesson on the different types of networks and different transmission technologies. It also covers the two main models that govern how networks work: the OSI model and the TCP/IP model, as well as their related layers. The course includes a detailed discussion of the many protocols that allow networks and network devices to communicate with one another and includes a discussion of firewalls and wireless networks. This course is designed for IT professionals and other adult learners interested in gaining an introduction to information technology security.
Asset Security
Companies must protect their assets. Just as locks go on the doors to protect physical assets, electronic and data assets must be guarded. Asset security involves the full support of everyone in an organization, from corporate-level personnel to frontline employees. Various security controls will be described that help protect privacy, along with data leakage prevention (DLP).
Security and Risk Management
This course covers the role of governance and risk management in information security. It looks at the policies and standards needed to operate an effective information security function and oversee good information security practices. The course also includes a look at how modern organizations manage information security risks and how to conduct a risk analysis. It concludes by examining the process for providing information security training and education.
Security Engineering
This course introduces the key concepts of cryptography and security engineering. It examines the role of encryption in information security and considers common encryption methods. In addition, the course discusses ciphers, their substitutes, and how they work. Public key infrastructure and management are also covered.
Identity and Access Management
This course introduces students to the principles of access controls, beginning with the central modes of information security and continuing through various attacks and defences. The course presents different kinds of authentication techniques, how they work and how they are distinguished.
Security Assessment and Testing
Focusing on potential disruptions affecting organizations and how they can be addressed with assessments and plans. Learners will have the opportunity to practice how to assess the impact of disasters that may arise, as well as to develop their versions of these plans.
Security Operations
A detailed overview of security operations: administrative controls, trusted recovery and change and incident management. This course establishes a foundation in auditing, monitoring and detection in information security.
Software Development Security
While focusing on the systems' development life cycle, operating systems and environments. Additional topics include the role of various databases in security and how to recognize and guard against attacks on software. Students will have the opportunity to apply application security controls.
Completion Requirements
Students must successfully complete all program courses to earn their certificate.
Related Careers
A wide range of career paths are available to graduates of this program, including:
IT Administrator
Security Officer
Admission Requirements
This course requires a basic understanding of IT concepts.
Additional Requirements
Technology Requirements
In these courses, online learners will require a personal computer (PC) or laptop with a reliable internet connection to access coursework.
Software Requirements
All software resources are available within each online course.
Program Cost
Funding for Continuing Education Courses
Students enrolled in continuing education programs may qualify for program-dependent funding opportunities, such as awards, scholarships, government funding and grants.