Professional Cybersecurity Certificate
This certificate is no longer taking new applicants.
Credits from this certificate may also be applied toward a Master of Science in Technology, Cybersecurity and Policy. The MS-TCP program is also no longer taking new applicants.
Curriculum and Requirements
Take CYBR 5300 and three additional courses from the list below.
Courses
- Instructors: Daniel Massey and Al Pisano
- Description: Introduces core concepts in cybersecurity including confidentiality, integrity, authentication, risk management, and adversarial thinking. The concepts will be applied to both traditional information technology (IT) systems and cyber physical systems (CPS). The course provides a cyber security foundation that will allow practitioners in other fields apply to understand cyber security trade-offs and will also provide interested students with a basis further study in cyber security. At the conclusion of the course, students should have a solid foundation in cybersecurity and hands-on experience.
- Instructor: Eric Goodman
- Offered Spring 2021
- Description:This Cybersecurity Network Analytics course takes a hands-on approach to detecting malicious activity within network traffic. The course will first introduce methodologies for analyzing cyber data. This knowledge will then be used practically, as the students will be given the chance to test out approaches on real traffic. At the conclusion, students will have both a theoretical understanding of cyber algorithms and their use in a real-world setting. Recommended prerequisite: C++ and Linux/Unix experience and knowledge of computer networking.
- Instructor: Aaron Hansen
- Description: Learn how to identify, collect, examine, analyze, and present digital evidence and the legal challenges associated with conducting digital forensics investigations. Explore various file system types and structures. Learn how to recovery and extract potential evidence from deleted files and directories. Learn how to capture and profile data residing in live memory. Analyze running processes and recover memory artifacts. Learn about various methods data can be hidden on a computing devices, storage media, and within covert communications channels.
- Instructor: Aaron Hansen
- Description: This course is an introduction to the principles and techniques associated with security auditing and penetration testing. Topics covered include; planning, reconnaissance, scanning, enumeration, exploitation, post-exploitation, and reporting. Students discover how system vulnerabilities can be exploited. Students will develop an understanding of current cybersecurity issues and how user, administrator, and programmer errors can result in security breaches.
- Instructor: Kyle Murbach
- Description: Discover the technological principles of a human-made device, object, or system through analysis of its structure, function, and operation. Students will extensively study malicious software and learn about assembly languages and C libraries, e.g., C++.
This list is subject to change as course offerings are expanded.
Additional Requirements
- You may petition to substitute one course with permission from your graduate advisor.
- You must apply for the certificate program and then enroll via one of the below pathways outlined in the next section.
- You may not double count courses between multiple CU certificates.
- In order to earn a certificate, you must receive a minimum grade of a C or higher in each course. The cumulative GPA for certificate courses must be 3.0 or higher.