Cybersecurity

Undergraduate Certificate of Completion

One of the fastest growing career fields, cybersecurity is about protecting computers, networks, programs, data or personal information from unauthorized access, theft, or destruction. This certificate gives IT specialists skills needed to enter the cybersecurity field. All students must take Introduction to Cyber Threats, Technologies, and Security and three out of the remaining five courses.

Interested in this degree?  Start Here

Courses in the major include:

This course introduces the goals, functional processes, tools, and techniques associated with network security. Services such as firewalls, intrusion detection mechanisms and Virtual Privat Networks (VPNs) will be studied. Students will develop an understanding of telecommunications and networks security protocols used to prevent, detect, and correct potential vulnerabilities associated with both the outsider and insider threat.

This course provides the student with the basic topics associated with controlling how resources are accessed in an information system. Topics include organizational access control models, security models, and hardware and software controls that can be used to support those models. Additional topics include access models, and securing system access with passwords, smart cards and biometric devices to assist in securing system access and ensure confidentiality, integrity, and availability of data. Technologies such as remote authentication and Public Key Infrastructure (PKI) are also explored.

This course is intended to introduce students to the principles of risk assessment, vulnerability analysis, and auditing and how they are used to evaluate the effectiveness of information security controls. Students will develop an understanding of threat and asset identification, countermeasures and safeguards, acceptable risks, and vulnerabilities. The auditing concepts of technical, physical, and administrative controls will also be introduced along with how these controls are measured for effectiveness.

This course is designed to explain the process of gathering requirements with emphasis on the successful management of requirements and its relationship to project success. Topics covered include requirements gathering techniques, identifying success criteria, and common reasons for project failure. Prerequisite: CIS 433 or CIS 633 or acceptance into the Master of Project Management (MPM) degree program.

This course focuses on the skills required to operate a security program within an organization. Coverage includes the practical application of security practices in an operational environment. Topics that comprise this course include security structure, leading security projects, policy management, human factors of security, and physical security methods.

This course examines basic methods of investigation, information acquisition, and management of Internet and computer forensic cases. Topics include record-searching, note taking and report writing, and using scientific methodology in Cyber investigations. Coverage also includes basic tools and techniques for forensic analysis of computers, networks systems, and mobile devices.

Your Experience Counts

Bellevue University welcomes the college-level learning you already have and will count it toward your degree. Take advantage of the credits you have. Save time and money.


Real Learning for Real Life

Tracy Zamora graduated from Bellevue University through her employer's partnership with Bellevue University. Now, she directly applies the knowledge and skills she earned from her BS in Behavioral Science to her role. Her colleagues notice and she's their go-to for advice.

Menu
Top