Call us Now: 1-866-827-8467
Inquire NOW

Cybersecurity (Graduate)

Cybersecurity is one of the most critical disciplines in our world today. Get the expertise needed to prevent cyber crime in your organization with in-depth courses on the human and technological elements of cybersecurity. All students must complete Information Security Management and may select 3 from the following courses:

Required Course

  • Information Security Management
Choose any 3 of the following courses:
  • Computer Forensics
  • Information Warfare
  • Cloud Computing
  • Security Architecture and Design
  • Ethical Hacking and Response

Courses in this certificate include:

This course is designed as an overview of the investigative methods and tools associated with computer forensics. Topics include: processing crime and incident scenes, digital evidence controls, recovery of information, network forensics, data acquisition, and legal and ethical issues associated with investigations.
This course addresses the issues relating to successful information security management. Topics include access control systems, network and software security, management practices, risk management, protection mechanisms, business continuity planning, and legal and ethical issues. The course allows for analysis of current security management models.
This course is designed as an overview of the fundamental processes associated with waging war in an electronic age. Topics include strategic planning and tactical analysis for target identification, reconnaissance, and tool selection. The intent of this course is to focus on individual, corporate and national forms of warfare.
This course focuses on the architecture and security associated with cloud computing. Emphasis in placed on key drivers which lead to cloud computing adoption and issues associated with cloud computing governance. Additional topics will include infrastructure security, identity and access management, cloud services, data security and storage, and auditing and compliance. Prerequisites: Graduate Standing
This course provides an introduction to the fundamental components of security architecture. Topics include computer organization; hardware, software and firmware components; open and distributed systems; and protection mechanisms. Discussion also includes certification and accreditation; formal security models; and evaluation criteria. Assigned projects include designing a model secure system.
This course provides a technical study of offensive and defensive techniques for protecting cyber assets. Topics include security testing, risk mitigation techniques, and threat response. Discussion also includes penetration testing theory, techniques, and tools; network, systems, and application vulnerability scanning; risk analysis and response; and intrusion detection and response. Emphasis is placed on identification of system vulnerabilities and threats and techniques for preventing attacks.

Recognizing Your Success

Learn how Certificates of Completion can lead to advancement in your company while also earning you credit toward your degree.


© Bellevue University. All rights reserved. | Privacy | Terms of Use | Accreditation | Consumer Information
© 2017 SunTrust Banks, Inc. SunTrust is a federally registered service mark of SunTrust Banks, Inc.