Skip to Main Content

Cybersecurity

history

 

Program Overview: Certificate

Graduate Certificate in Professional Studies: Cybersecurity Strategy and Policy

The Graduate Certificate in Professional Studies: Cybersecurity Strategy & Policy provides students the essential domain knowledge required to serve in decision-making roles throughout the cybersecurity industry. Students will learn how to analyze cybersecurity risks, develop appropriate protection & response options, and assess operational requirements for government, military, critical infrastructure, and commercial missions. Upon completing the certificate, students will possess advanced knowledge of the strategy, policy, and analytic aspects of cybersecurity, enabling them to fill critical roles in operational cybersecurity missions supporting both industrial and governmental entities.

This four-course graduate certificate can be completed in a year. Because these courses are not technical, this program is available to students with a variety of undergraduate or work backgrounds. Students may choose to take this certificate by itself, or they may take this certificate and then later complete the master's. If a student is accepted into the M.P.S.: Cybersecurity, all four certificate courses count toward that degree.

Required Courses

Program Learning Outcomes

By the end of this program, students will be able to:

  • Discuss in depth the origins, nature, and current issues in cybersecurity and its related
    activities using precise terminology
  • Apply a range of cybersecurity concepts to mitigate risks in cybersecurity operations
  • Develop and apply decision frameworks using the guidelines of cybersecurity ethics, law, and strategy
  • Manage the development of cybersecurity standards and capabilities
  • Design strategies for development of an effective cybersecurity workforce
  • Analyze technical and operational requirements for future cybersecurity systems
  • Compare and contrast international cybersecurity policies, strategies, and capabilities
  • Identify the missions, authorities, and responsibilities of key cybersecurity organizations within the international community
  • Apply the theory of cyber deterrence in developing future cybersecurity strategies and policies
  • Analyze and apply lessons from prominent international cybersecurity case studies