Learn best practices, tools, methods and strategies that are immediately applicable to the work environment and emerging technologies and industries. Credits from this certificate may also be applied toward a Master of Science in Technology, Cybersecurity and Policy if you decide to further your eduction. Enroll full- or part-time to complete the certificate on your timeline.
Curriculum and Requirements
Take CYBR 5300 and then choose three additional courses from the list below.
CYBR 5300 Intro to Cybersecurity *
- Instructors: Daniel Massey and Al Pisano
- Description: Introduces core concepts in cybersecurity including confidentiality, integrity, authentication, risk management, and adversarial thinking. The concepts will be applied to both traditional information technology (IT) systems and cyber physical systems (CPS). The course provides a cyber security foundation that will allow practitioners in other fields apply to understand cyber security trade-offs and will also provide interested students with a basis further study in cyber security. At the conclusion of the course, students should have a solid foundation in cybersecurity and hands-on experience.
CYBR 5320 Cybersecurity Network Analytics
- Instructor: Eric Goodman
- Offered Spring 2021
- Description:This Cybersecurity Network Analytics course takes a hands-on approach to detecting malicious activity within network traffic. The course will first introduce methodologies for analyzing cyber data. This knowledge will then be used practically, as the students will be given the chance to test out approaches on real traffic. At the conclusion, students will have both a theoretical understanding of cyber algorithms and their use in a real-world setting. Recommended prerequisite: C++ and Linux/Unix experience and knowledge of computer networking.
CYBR 5330 Digital Forensics *
- Instructor: Aaron Hansen
- Description: Learn how to identify, collect, examine, analyze, and present digital evidence and the legal challenges associated with conducting digital forensics investigations. Explore various file system types and structures. Learn how to recovery and extract potential evidence from deleted files and directories. Learn how to capture and profile data residing in live memory. Analyze running processes and recover memory artifacts. Learn about various methods data can be hidden on a computing devices, storage media, and within covert communications channels.
CYBR 5350 Security Auditing and Penetration Testing
- Instructor: Aaron Hansen
- Description: This course is an introduction to the principles and techniques associated with security auditing and penetration testing. Topics covered include; planning, reconnaissance, scanning, enumeration, exploitation, post-exploitation, and reporting. Students discover how system vulnerabilities can be exploited. Students will develop an understanding of current cybersecurity issues and how user, administrator, and programmer errors can result in security breaches.
CYBR 5830 Reverse Software Engineering
- Instructor: Kyle Murbach
- Description: Discover the technological principles of a human-made device, object, or system through analysis of its structure, function, and operation. Students will extensively study malicious software and learn about assembly languages and C libraries, e.g., C++.
This list is subject to change as course offerings are expanded and as special topics courses become official CYBR courses.
- You may petition to substitute one course with permission from your graduate advisor.
- You must apply for the certificate program and then enroll via one of the below pathways outlined in the next section.
- You may not double count courses between multiple CU certificates.
- In order to earn a certificate, you must receive a minimum grade of a C or higher in each course. The cumulative GPA for certificate courses must be 3.0 or higher.