The need to protect the electronic and physical property of organizations from intruders, potential theft and other compromising acts is considered paramount for the fast-paced global economy. The increase of mobile users, digital applications and data networks deepens the reliance on transmitted data and information through cyberspace. This growth requires the advanced study of information security as hackers constantly explore and exploit any new protective measures put in place by organizations. Cyber attacks and digital spying are the top threats to national security, as sensitive information such as employees’ social security numbers, passwords and passcodes, network outages, computer viruses and other incidents threaten the security of many organizations. The on-campus and online Cyber Security Professional Certificate program is an intermediate level program that builds on technical skills that are needed to defend the enterprise environment and to protect an organization, such as packet analysis, penetration testing, incident handling and malware removal.
This certificate is 32 quarter credit hours and may be incorporated into a degree program or taken as a stand-alone certificate in 12 months for part-time students.
The Cyber Security Professional Certificate focuses on teaching:
Cyber programs offer real-world applications of classroom theory in a laboratory environment (augmented with virtual resources).
32 Credit Hours
Length: 12 months
Time length for program completion will vary depending upon the number of courses taken per term, developmental courses when required, transfer credit accepted, lack of continuous enrollment, etc.
|Total Credit Hours||32|
|MNE 310||Security Certified Network Professional (SCNP)||4|
|MNE 314||Designing Security for Microsoft Networks||4|
|MNE 320||Certified Ethical Hacking||4|
|MNE 340||Network Security Architecture||4|
|MNE 360||Network Penetration Testing||4|
|MNE 365||Computer Hacking Forensic Investigator||4|
|MNE 430||Security Design and Compliance I||4|
|MNE 450||Security Design and Compliance II||4|