Bellevue University Tops U.S. News Rankings

Cybersecurity Certificate of Completion - Graduate

Students seeking this certificate of completion will need to successfully complete:

(Click a course name below to view course details).

  • CIS 608 Information Security Management

    This course addresses the issues relating to successful information security management. Topics include access control systems, network and software security, management practices, risk management, protection mechanisms, business continuity planning, and legal and ethical issues. The course allows for analysis of current security management models.
    University Syllabus

In addition, students will select 9 credits (3 classes) from those below:

  • CIS 607 Computer Forensics

    This course is designed as an overview of the investigative methods and tools associated with computer forensics. Topics include: processing crime and incident scenes, digital evidence controls, recovery of information, network forensics, data acquisition, and legal and ethical issues associated with investigations.
    University Syllabus

  • CIS 610 Information Warfare

    This course is designed as an overview of the fundamental processes associated with waging war in an electronic age. Topics include strategic planning and tactical analysis for target identification, reconnaissance, and tool selection. The intent of this course is to focus on individual, corporate and national forms of warfare.
    University Syllabus

  • CIS 611 Cloud Computing

    This course focuses on the architecture and security associated with cloud computing. Emphasis in placed on key drivers which lead to cloud computing adoption and issues associated with cloud computing governance. Additional topics will include infrastructure security, identity and access management, cloud services, data security and storage, and auditing and compliance. Prerequisites: Graduate Standing
    University Syllabus

  • CYBR 515 Security Architecture and Design

    This course provides an introduction to the fundamental components of security architecture. Topics include computer organization; hardware, software and firmware components; open and distributed systems; and protection mechanisms. Discussion also includes certification and accreditation; formal security models; and evaluation criteria. Assigned projects include designing a model secure system.
    University Syllabus

  • CYBR 525 Ethical Hacking and Response

    This course provides a technical study of offensive and defensive techniques for protecting cyber assets. Topics include security testing, risk mitigation techniques, and threat response. Discussion also includes penetration testing theory, techniques, and tools; network, systems, and application vulnerability scanning; risk analysis and response; and intrusion detection and response. Emphasis is placed on identification of system vulnerabilities and threats and techniques for preventing attacks.
    University Syllabus

Thanks for your interest in Bellevue University.

When you click the submit button below, our staff will contact you within 48 hours to get you the information you need and answer any questions.

Yes No