Cybersecurity Certificate of Completion - Graduate
Students seeking this certificate of completion will need to successfully complete:
(Click a course name below to view course details).
CIS 608 Information Security Management
This course addresses the issues relating to successful information security management. Topics include access control systems, network and software security, management practices, risk management, protection mechanisms, business continuity planning, and legal and ethical issues. The course allows for analysis of current security management models.
In addition, students will select 9 credits (3 classes) from those below:
CIS 607 Computer Forensics
This course is designed as an overview of the investigative methods and tools associated with computer forensics. Topics include: processing crime and incident scenes, digital evidence controls, recovery of information, network forensics, data acquisition, and legal and ethical issues associated with investigations.
CIS 610 Information Warfare
This course is designed as an overview of the fundamental processes associated with waging war in an electronic age. Topics include strategic planning and tactical analysis for target identification, reconnaissance, and tool selection. The intent of this course is to focus on individual, corporate and national forms of warfare.
CIS 611 Cloud Computing
This course focuses on the architecture and security associated with cloud computing. Emphasis in placed on key drivers which lead to cloud computing adoption and issues associated with cloud computing governance. Additional topics will include infrastructure security, identity and access management, cloud services, data security and storage, and auditing and compliance. Prerequisites: Graduate Standing
CYBR 515 Security Architecture and Design
This course provides an introduction to the fundamental components of security architecture. Topics include computer organization; hardware, software and firmware components; open and distributed systems; and protection mechanisms. Discussion also includes certification and accreditation; formal security models; and evaluation criteria. Assigned projects include designing a model secure system.
CYBR 525 Ethical Hacking and Response
This course provides a technical study of offensive and defensive techniques for protecting cyber assets. Topics include security testing, risk mitigation techniques, and threat response. Discussion also includes penetration testing theory, techniques, and tools; network, systems, and application vulnerability scanning; risk analysis and response; and intrusion detection and response. Emphasis is placed on identification of system vulnerabilities and threats and techniques for preventing attacks.
Error while processing your submission.
There was an error while trying to process your submission. We are sincerely sorry for the inconvenience.
Please reach out to one of our Admission Counselors and they can answer any questions you have at 1-800-756-7920 (option 1). The Admissions office is open Monday through Thursday 8:00 a.m. to 8:00 p.m. (CST) and Fridays from 8:00 a.m. to 5:00 p.m. (CST).
Congratulations on taking your first step towards earning your degree!
At Bellevue University, our passion is to help you get started and support you all along the way. In fact, we’ve found that many students have benefited from our complimentary “Smarter Measure” Self-Assessment which will help you prepare for success. Again, this is a free service.
Your User Name: ready
Your Password: ready
Just click here to start. Smarter Measure
Thanks again. We look forward to working with you!