Cybersecurity Certificate

Level:

Certificate

Credits required:

12 credits

Cost per credit:

$1,000

Next start date:

May 6, 2024

Keep Data and Organizations Secure

Cybersecurity professionals help organizations protect their most important assets, including data, systems, and employees. In the post-baccalaureate certificate in cybersecurity, you’ll learn about uncovering vulnerabilities, reducing corporate risk, and best practices to take a proactive approach to safeguarding organizations.

Achieve More with a Master's Degree

Further specialize your cybersecurity skills by stacking this certificate with another offered in the Master of Management Information Systems and completing capstone coursework. Earning your MMIS will give you a unique skillset and help you stand out in the workforce. The MMIS is available entirely online.

The First Step is a Conversation. Talk to Kelly.

Kelly Seipert

Kelly Seipert

MMIS Program Coordinator
(435) 797-5848
kelly.seipert@usu.edu

College: Jon M. Huntsman School of Business

Department: Data Analytics & Information Systems

Find Your Fit

Take a few minutes to determine how a USU Online program can help you meet your education and career goals.

Cybersecurity Curriculum Preview

 

This course introduces students to the field of information security, with hands-on exercises in information, network, and physical security and real-world demonstrations of hardening and exploiting systems. 

Students use tools and techniques to secure and analyze large networks. Class sessions focus on hands-on labs to write intrusion detection rules (IDS), perform forensic investigation of hard drives, learn advanced packet analysis and learn techniques for penetration testing. 

Students master the essential principles by which the internet and data communication are made possible. They learn how to speak binary, phrase protocols, leverage layers, and build pi-hole. Additional coursework is required for those enrolled in the graduate-level course. 

This course provides a foundation in this branch of forensic science, encompassing the legal and technical aspects of the recovery and investigation of deleted and/or hidden data found in computers, smartphones, or even in the cloud, often in relation to computer crime.