Call Us Now: 1-228-376-8750  


Undergraduate level

One of the fastest growing career fields, cybersecurity is about protecting computers, networks, programs, data or personal information from unauthorized access, theft, or destruction. This certificate gives IT specialists skills needed to enter the cybersecurity field. All students must take Introduction to Cyber Threats, Technologies, and Security and three out of the remaining five courses.

Courses in this certificate include:

This course introduces the goals, functional processes, tools, and techniques associated with network security. Services such as firewalls, intrusion detection mechanisms and Virtual Privat Networks (VPNs) will be studied. Students will develop an understanding of telecommunications and networks security protocols used to prevent, detect, and correct potential vulnerabilities associated with both the outsider and insider threat.
This course provides the student with the basic topics associated with controlling how resources are accessed in an information system. Topics include organizational access control models, security models, and hardware and software controls that can be used to support those models. Additional topics include access models, and securing system access with passwords, smart cards and biometric devices to assist in securing system access and ensure confidentiality, integrity, and availability of data. Technologies such as remote authentication and Public Key Infrastructure (PKI) are also explored.
This course is intended to introduce students to the principles of risk assessment, vulnerability analysis, and auditing and how they are used to evaluate the effectiveness of information security controls. Students will develop an understanding of threat and asset identification, countermeasures and safeguards, acceptable risks, and vulnerabilities. The auditing concepts of technical, physical, and administrative controls will also be introduced along with how these controls are measured for effectiveness.
This course is designed to explain the process of gathering requirements with emphasis on the successful management of requirements and its relationship to project success. Topics covered include requirements gathering techniques, identifying success criteria, and common reasons for project failure. Prerequisite: CIS 433 or CIS 633 or acceptance into the Master of Project Management (MPM) degree program.
This course focuses on the skills required to operate a security program within an organization. Coverage includes the practical application of security practices in an operational environment. Topics that comprise this course include security structure, leading security projects, policy management, human factors of security, and physical security methods.
This course examines basic methods of investigation, information acquisition, and management of Internet and computer forensic cases. Topics include record-searching, note taking and report writing, and using scientific methodology in Cyber investigations. Coverage also includes basic tools and techniques for forensic analysis of computers, networks systems, and mobile devices.

Recognizing Your Success

Learn how Certificates of Completion can lead to advancement in your company while also earning you credit toward your degree.

Earn Credit Toward Your Degree

The courses in these certificates of completion all carry college credit with them, so they can be applied to your undergraduate or graduate degree.

© Bellevue University. All rights reserved. | Privacy | Terms of Use | Accreditation | Consumer Information