Skip to main content

online certificate of completion in cybersecurity

Build the skills to protect data and defend against cyber threats with hands-on training in the core principles and practices of cybersecurity.
Spring term classes start March.

100% online learning.

Earn your degree on your schedule

$459 per credit hour.
12 total credit hours.

4 courses, 3 credit hours per course, 8 month program

hands-on experience to build practical skills for a career in cybersecurity.

The Undergraduate Certificate of Completion in Cybersecurity provides a strong foundation in the principles, technologies, and practices essential to protecting digital systems and information. Designed for learners seeking to enter or advance in the cybersecurity field, this four-course program begins with an introduction to core cybersecurity concepts, including threats, technologies, and system design strategies for safeguarding data. After completing the introductory course, students choose from a range of specialized topics to tailor their learning to personal interests or career goals. Options include areas such as network defense, access control, risk assessment, operational security, ethical hacking, digital forensics, and web application security. This flexible structure allows learners to explore both technical and strategic aspects of cybersecurity. Throughout the program, students gain exposure to real-world tools, scenarios, and best practices used to detect, prevent, and respond to cyber threats. Emphasis is placed on understanding evolving risks, ethical considerations, and the importance of maintaining system integrity in a connected world. Upon completion, learners will be equipped with the foundational knowledge and practical awareness needed to pursue further study or entry-level roles in cybersecurity and information assurance.

what you'll learn.

Develop a foundational understanding of cybersecurity principles and gain hands-on experience using tools and techniques to identify, assess, and mitigate digital threats.

upon graduation, students will be able to:
  • Understand fundamental cybersecurity concepts, threats, and technologies used to protect digital systems and information.
  • Apply basic tools and techniques to identify vulnerabilities and support secure system operations.
  • Analyze common cybersecurity risks to recommend appropriate protective measures in various scenarios.
Take the next step to advance your career.

Awards

Accreditation image 1
Accreditation image 2
Accreditation image 3
Accreditation image 4

Cybersecurity (Undergraduate) degree courses

Current students please login to BRUIN and select “Academic Progress” for your curriculum requirements.

Students seeking this certificate of completion will need to successfully complete:

This course introduces fundamental technologies used in information systems. Students will develop a foundation in cybersecurity by learning the fundamental concepts behind cybersecurity. In addition, students will learn cybersecurity principles used in the design of systems to protect information and assets against persistent and constantly evolving threats.

In addition, students will select 9 credits (3 classes) from those below:

This course introduces students to the goals, functional processes, tools, and techniques associated with network security. Services such as firewalls, intrusion detection mechanisms and Virtual Private Networks (VPNs) will be studied. Students will develop an understanding of telecommunications and networks security protocols used to prevent, detect, and correct potential vulnerabilities associated with both the outsider and insider threat. Pre-requisite: CYBR 250 recommended

This course provides the student with the basic topics associated with controlling how resources are accessed in an information system. Topics include organizational access control models, security models, and hardware and software controls that can be used to support those models. Additionally, students will learn about access models, securing systems access with passwords, smart cards, and biometric devices to ensure data confidentiality, integrity and availability. This course also explores technologies like remote authentication and Public Key Infrastructure (PKI). Pre-requisite: CYBR 250 recommended

This course is intended to introduce students to the principles of risk assessment, vulnerability analysis, and auditing and how they are used to evaluate the effectiveness of information security controls. Students will develop an understanding of threat and asset identification, countermeasures and safeguards, acceptable risks, and vulnerabilities. The auditing concepts of technical, physical, and administrative controls will also be introduced along with how these controls are measured for effectiveness. In addition, students will learn rules, regulations and issues related to compliance with applicable laws and regulations. Pre-requisite: CYBR 320

This course focuses on the knowledge required to operate a security program within an organization. Various components of secure operations, including policies, regulatory compliance, ethics, cryptography, human factors, and risk management are identified and applied to scenarios. Students will practice constructing a comprehensive security program that incorporates those secure operations components and concepts, including contingency plans and security awareness education. Pre-requisite: CYBR 250

This course explores cybersecurity considerations of web applications, such as how and why web applications are vulnerable, and how to mitigate those weaknesses through secure development and deployment practices using the Open Web Application Security Project (OWASP) Top 10 vulnerabilities as a focus. Students will exploit sample web application vulnerabilities and document the process. Pre-requisite: CYBR 309 and CYBR 340

This course examines basic methods of investigation, information acquisition, and management of Internet and computer forensic cases. Topics include record-searching, note taking and report writing, and using scientific methodology in Cyber investigations. Coverage also includes basic tools and techniques for forensic analysis of computers, networks systems, and mobile devices. Pre-requisite: CYBR 340

This course provides an introduction to penetration testing and incident response tactics, techniques, and procedures. Topics include ethical and legal implications of penetration testing, network information gathering, system vulnerability analysis, common tools and techniques used in penetration testing, traffic analysis, incident response, and related defensive measures. Pre-requisite: CIS 245, CYBR 340

12

Integrative General Education Credits

= 12 total credits*

University Accreditation

Bellevue University is accredited by the Higher Learning Commission ( hlcommission.org ), a regional accreditation agency recognized by the U.S. Department of Education.

Whether a college, university, or program is accredited is important to students receiving financial aid, employers who provide tuition assistance, donors, and the federal government.

Accreditation Information

This program is considered a non-licensure degree/certificate program and is not intended for those seeking licensure or the practice of licensed profession. This program may be relevant to multiple occupations that do not require licensure and was not designed to meet educational requirements for any specific professional license or certification.

*Consult with an admissions counselor to determine your eligible credits, as well as to verify minimum graduation requirements for this degree. Transfer credits must be from a regionally accredited college or university. Bellevue University makes no promises to prospective students regarding the acceptance of credit awarded by examination, credit for prior learning, or credit for transfer until an evaluation has been conducted.

learn on your own time, from anywhere.

Our flexible online courses are designed to bring quality learning into a format that fits your schedule, without sacrificing meaningful faculty feedback and collaboration with peers across the country. Stay on track with the help of your Student Coach — with you from day one to graduation.
Flexible schedule.

Study on your own time with courses designed to fit your busy life—whether you're working, raising a family, or serving in the military.

Reliable technical support.

Access 24/7 tech support to keep you connected and focused on learning, no matter where you are.

Dedicated online student support.

From coursework access and connectivity issues to tutoring and resume assistance, we've got you covered.

Engaging online learning.

Enjoy interactive courses designed for real-world application, with multimedia content, discussions, and hands-on projects.

nonprofit with national recognition

Whether you’re preparing for your next promotion or changing careers to better support your family, we offer more than 80 career-focused programs with 100% online and flexible learning options tailored to your needs.

National recognition logo 1
Phi Theta Kappa Transfer Honor Roll Seal
National recognition logo 3
National recognition logo 4

grow with faculty who’ve been where you are.

Learn from experienced educators who have established careers across diverse fields of study. Our instructors have worked with both prominent institutions and innovative organizations from around the world. Through their expertise, students will gain valuable insights and develop essential concepts and skills in their area of study.

FAQs

Explore our most commonly asked questions.

Get in touch with us

ready to learn more?

let's talk.

explore more.

Enhance your major with a complementary minor, or explore related degrees that align with your interests.

Related Programs

Bachelor's

Software Development
Online
  • 127 Credit Hours

Design and maintain software that improves people's lives

Master's

Intelligence and Security Studies
Online
  • 36 Credit Hours

Develop analytical skills in global security and intelligence and gain hands-on experience in addressing transnational threats impacting U.S. national security and international relations.

Master's

Instructional Design and Technology
Online
  • 36 Credit Hours

Learn the essential skills required to design and develop learning experiences online for the business and education industries.

explore stories and resources.

No articles available. Please add articles to this section. (up to 6)