/
/
/
/
Cybersecurity & Information Assurance

Cybersecurity & Information Assurance

The program is designed to provide graduates with the knowledge, skills, and transpersonal perspective necessary to start or grow a career.

The Next Level of Cybersecurity & Information Assurance

Protect Data & Systems with Real-World Cyber Defense Skills
Flexible, Career-Focused Training for Today’s Threat Landscape
Gain Expertise in Ethical Security Practices and Risk Management

The Graduate Certificate in Cybersecurity and Information Assurance is a comprehensive hands-on program that covers the field of cyber security from both an ethical offensive perspective to a defensive preventative perspective to ensure that students fully understand the entire realm of global cyber security and information assurance. The program focuses on all aspects of cyber security from physical security through advanced cryptologic security and utilizes current and relevant tools to ensure that students are well equipped as they enter the cyber security field.

The certificate program also focuses on the vital skills and tools of machine learning and data visualization, which are pervasive and highly desired in the cybersecurity domain. Students are taught data visualization and machine learning skills so that they can perform such tasks as advanced attack campaign and defense analysis, malware forensics/reverse engineering, and malware detection through deep learning and neural networks, which are skills that are in high demand in the cyber security domain.

The program also focuses on cryptography to ensure that students are well versed in encryption and encryption based attack and defensive systems. Machine learning and data visualization hands-on applications are presented as major tools in the cryptologic domain to ensure that students are skilled in their programming and application.

All courses in the certificate program are reviewed on a quarterly basis to ensure that all material taught is current, relevant, and cutting-edge. All industry-relevant tools utilized in the program are also reviewed and updated regularly to ensure that students are job-ready when they complete the program.

Additionally, students that complete the program will be highly prepared to sit for the CompTIA Security+ exam (https://www.comptia.org/certifications/security) as well as the ISC2 CISSP exam (https://www.isc2.org/Certifications/CISSP), as well as other cyber security-centric certifications.

Summer Start Date:
July 7, 2025
Fall Start Date:
September 29, 2025
Winter Start Date:
January 12, 2026
April Start Date:
April 6, 2026
Program Length:
12 Months
Total Number of Units:
18 (Minimum)
Estimated Total Cost:
$9,360
Format:
Choose from On-Ground or Hybrid & Weekend Courses

Key Program Highlights:

We blend scholarship in transpersonal psychology with meaningful, transformative learning that inspires reflection, self-actualization and authentic leadership development.

Applied Practice

Engage in hands-on labs designed to provide direct, experiential learning of AI and Machine Learning tools.

Tech Visits

Participate in field trips to local technology companies, immersing you in real-world applications of AI and Machine Learning.

Academic Rigor

Delve into traditional graduate-level academics with a special focus on artificial intelligence and machine learning theories.

Research Endeavors

Contribute to the field with significant research and writing projects, fostering critical thinking in AI & Machine Learning.

Community Connections

Enhance your professional network by interacting with graduate students in the tech hubs of Silicon Valley and Southern California.

Software Creation

Gain practical experience in computer program development, a vital skill in the AI and Machine Learning industry.

Curriculum:

To receive a Graduate Certificate in Cybersecurity and Information Assurance, students must successfully complete a minimum of 18 units. The following are specific required courses.

  • 3 units in Cyber Security and Information Assurance
  • 3 units in Cyber Security: Defense
  • 3 units in Cyber Security: Forensics and Attack Analysis
  • 3 units in Applied Cryptography
  • 3 units in Advanced Threat Analysis 
  • 3 units in Machine Learning

This course covers vital information assurance and computer security principles as applied to computer systems and organizational information systems. Information assurance principles such as availability, integrity, and confidentiality are applied strategically to ensure the integrity of data and information. The complex concepts of data privacy, data security, and the relationship of security to organizational computer systems are integral to this course. Many facets of computer security such as integrated circuit security, physical security, personnel security, systems security, and operations security are discussed and related directly to information assurance principles. The concepts of risks, threats, and vulnerabilities as applied to computational systems are covered as well as the mitigation of them through various forms of software and computer technologies in a defense in depth structure. The course also includes a survey of various laws and government initiatives to implement information assurance in the organization in a lawful manner. The course concludes with the development of a NIST compliant comprehensive information assurance plan for the complete organization: PCs, networks, databases, and supporting communications infrastructure.

  • MSCS 3804

This course will cover the proactive and pre-emptive cyber defense of information system assets at the data level through the organizational level and ultimately the national level. The ultimate goal of proactive defense is to mitigate the cyber risk of the organization. As such, risk management is comprehensively integrated into the course. The defense of critical infrastructure is studied and plans for preventing, protecting, and providing time-sensitive responses to attacks or threats are covered in detail to ensure the confidentiality, integrity, and availability of data and information throughout the organization. The complexity of attacks and blended threats is covered from a holistic security point of view to ensure that threats from advanced or multiple sources are effectively mitigated to protect sensitive information and to safeguard organizational assets.

  • MSCS 3920

This course covers the art and science of cyber security forensics, which is the application of investigation and analytical techniques to cyber systems to extract and preserve information that can inform cyber professionals on risk mitigation and that can legally be presented as evidence in a court of law. The course covers attack analysis in detail and provides sound investigative methods for collecting, analyzing, preserving, and interpreting cyber information and evidence. In addition to the technological aspects of cyber forensics, the course will cover the legal aspects of cyber forensics including classifications of evidence, evidence preservation, evidence tampering, discovery procedures and protocols, and case presentation in court. The course will conclude with a comprehensive case study and the techniques and processes used to construct cyber forensic reports and evidence repositories for pending cyber-criminal cases.

  • MSCS3921

This course covers the basic and advanced concepts of cryptography and applies them to real world applications with a special emphasis on cyber security applications. It covers the mathematical and logical aspects of cryptographic systems and how these constructs apply to real-world applications. The course also covers basic and advanced cryptographic protocols. Ciphers, encryption, and message integrity will be studied extensively. A comprehensive study of key systems will be a major part of the class. The course will conclude with the construction of original cryptographic constructs that are applied to real world applications and tested for effectiveness and efficiency.

  • MSCS 3922

This course covers advanced techniques of complex, blended threat analysis to ensure that the organization and its information assets are safe and secure through methods that facilitate the confidentiality, integrity, and availability of data and information at all organizational levels. The course focuses on advanced machine learning and artificial intelligence techniques and software that pre-emptively assess and mitigate threats from local, national, and international sources. Extensive threat data modeling and analysis techniques are studied and applied to myriad science, technology, engineering, and management domains and industries. Special emphasis is placed on mitigating zero-day and large scale coordinated attacks on an organization’s information infrastructure. The course explores and dissects case studies to demonstrate the best approaches and lessons learned from recent global cyber-attacks. The course concludes with the development of a software system that can sense and detect attack pre-emptions and protect the organization from those attacks, even if they are zero-day attacks based on sound threat analytics, visualizations, and models.

  • MSCS 2219

Machine learning is a complex yet a fast-moving field with many real world commercial applications. The goal of machine learning is to build computer models that can produce useful information, whether they are predictions, associations, or classifications. The ultimate goal for many machine-learning researchers is to build computing systems that can automatically adapt and learn from their experience. This course will study the theory and practical algorithms, basic concepts and paradigms, key techniques, challenges, and tricks of machine learning. It also covers examples of how machine learning is used/applied today in the real world, and exposes students to the construction and use of machine learning algorithms. This course discusses recent applications of machine learning, such as to robotic control, speech recognition, face recognition, data mining, autonomous navigation, bioinformatics, and text and web data processing. It also fuses machine learning with other areas of artificial intelligence and robotics.

  • MSCS 2202

Frequently Asked Questions (FAQs):

The program is designed to be completed in as little as 12 months, making it a fast and efficient way to increase your marketability as a cybersecurity professional.

You will learn all aspects of cybersecurity, from physical security through advanced cryptologic security, utilizing current and relevant tools. The program also provides hands-on applications in machine learning and data visualization, enabling you to perform advanced attack campaign and defense analysis, malware forensics/reverse engineering, and more.

Yes, all courses in the certificate program are reviewed on a quarterly basis to ensure that all material taught is current, relevant, and cutting-edge. This ensures you’re learning the latest techniques and tools in the field.

Completing the program will prepare you to sit for the CompTIA Security+ exam and the ISC2 CISSP exam, among other cybersecurity-centric certifications. These are highly recognized and respected certifications in the field.

Dr. Donna Dulo

Program Chair for Computer Science Department

Dr. Dulo has extensive experience in the field of aerospace software safety engineering and aviation cybersecurity and is an expert in drone systems engineering and drone/ aviation law. She retired from the Department of Defense as a computer scientist and mathematician with 34 years of combined active duty and civilian service. She writes extensively in the area of Aviation and Drone Law for the American Bar Association and wrote the seminal Drone Law book for the ABA which continues to be an authoritative legal reference.

Full Faculty Bio

Translate »

Apply immediately.

Already know how to enroll? Click here to be taken to our online application portal.

Get help from an advisor.

Not sure where to begin? Click below to speak with an enrollment advisor from Sofia.

/
/
/
/
Cybersecurity & Information Assurance