The Graduate Certificate in Cybersecurity and Information Assurance is a comprehensive hands-on program that covers the field of cyber security from both an ethical offensive perspective to a defensive preventative perspective to ensure that students fully understand the entire realm of global cyber security and information assurance. The program focuses on all aspects of cyber security from physical security through advanced cryptologic security and utilizes current and relevant tools to ensure that students are well equipped as they enter the cyber security field.
The certificate program also focuses on the vital skills and tools of machine learning and data visualization, which are pervasive and highly desired in the cybersecurity domain. Students are taught data visualization and machine learning skills so that they can perform such tasks as advanced attack campaign and defense analysis, malware forensics/reverse engineering, and malware detection through deep learning and neural networks, which are skills that are in high demand in the cyber security domain.
The program also focuses on cryptography to ensure that students are well versed in encryption and encryption based attack and defensive systems. Machine learning and data visualization hands-on applications are presented as major tools in the cryptologic domain to ensure that students are skilled in their programming and application.
All courses in the certificate program are reviewed on a quarterly basis to ensure that all material taught is current, relevant, and cutting-edge. All industry-relevant tools utilized in the program are also reviewed and updated regularly to ensure that students are job-ready when they complete the program.
Additionally, students that complete the program will be highly prepared to sit for the CompTIA Security+ exam (https://www.comptia.org/certifications/security) as well as the ISC2 CISSP exam (https://www.isc2.org/Certifications/CISSP), as well as other cyber security-centric certifications.
At-a-glance information about this course for your convenience:
Summer Start Date:
July 3, 2023
Fall Start Date:
October 2, 2023
Winter Start Date:
January 8, 2024
Total Number of Units:
Choose from On-Ground or Hybrid & Weekend Courses (Effective from the Fall 2021 Quarter Term, our MSCS courses will be offered only during the weekends and through the University’s Learning Management System (which can be completed at home). Some courses may be structured as directed studies in which students work one-on-one with the Program Chair or other faculty.)
Click here to see admissions requirements
What are some of the benefits for taking the Cyber Security Graduate Certificate course?
- The program covers both the ethical offensive and defensive postures of cyber security.
- The program develops data visualization and machine learning skills to equip students with the ability to develop/utilize advanced cyber security tools and analytical methods.
- It covers vital cryptologic principles to ensure that students can use all encryption algorithms and products.
- Covers physical, managerial and technological-based security.
- Focuses on comprehensive risk management.
- Aligns with the NIST Cyber Security Framework (utilized by over 70% of US-based organizations).
- Aligns with ISO/IEC 27000 family of international standards utilized by organizations worldwide.
- Prepares students to sit for the CompTIA Security+ Exam.
- Prepares students to sit for the ISC2 CISSP Exam (the preeminent security certification).
- All courses in the program are integrated with each other to form a fluent program.
- All courses cover basic topics so that anyone can do well in the program, even without a cyber-security or computer science background.
Key Program Highlights:
Interested in discovering how you’ll learn in the classroom?
1. Applied Practice
Engage in hands-on labs designed to provide direct, experiential learning of AI and Machine Learning tools.
2. Tech Visits
Participate in field trips to local technology companies, immersing you in real-world applications of AI and Machine Learning.
3. Academic Rigor
Delve into traditional graduate-level academics with a special focus on artificial intelligence and machine learning theories.
4. Research Endeavors
Contribute to the field with significant research and writing projects, fostering critical thinking in AI & Machine Learning.
5. Community Connections
Enhance your professional network by interacting with graduate students in the tech hubs of Silicon Valley and Southern California.
6. Software Creation
Gain practical experience in computer program development, a vital skill in the AI and Machine Learning industry.
Meet the Instructor:
Dr. Donna Dulo
Learn more about the instructor for this program:
Dr. Donna Dulo
Program Chair for Computer Science Department
Dr. Dulo has extensive experience in the field of aerospace software safety engineering and aviation cybersecurity and is an expert in drone systems engineering and drone/ aviation law. She retired from the Department of Defense as a computer scientist and mathematician with 34 years of combined active duty and civilian service. She writes extensively in the area of Aviation and Drone Law for the American Bar Association and wrote the seminal Drone Law book for the ABA which continues to be an authoritative legal reference.
To receive a Graduate Certificate in Cybersecurity and Information Assurance, students must successfully complete a minimum of 18 units. The following are specific required courses.
This course covers vital information assurance and computer security principles as applied to computer systems and organizational information systems. Information assurance principles such as availability, integrity, and confidentiality are applied strategically to ensure the integrity of data and information. The complex concepts of data privacy, data security, and the relationship of security to organizational computer systems are integral to this course. Many facets of computer security such as integrated circuit security, physical security, personnel security, systems security, and operations security are discussed and related directly to information assurance principles. The concepts of risks, threats, and vulnerabilities as applied to computational systems are covered as well as the mitigation them through various forms of software and computer technologies in a defense in depth structure. The course also includes a survey of various laws and government initiatives to implement information assurance in the organization in a lawful manner. The course concludes with the development of a NIST compliant comprehensive information assurance plan for the complete organization: PCs, networks, databases, and supporting communications infrastructure.
This course will cover the proactive and pre-emptive cyber defense of information system assets at the data level through the organizational level and ultimately the national level. The ultimate goal of proactive defense is to mitigate the cyber risk of the organization. As such, risk management is comprehensively integrated into the course. The defense of critical infrastructure is studied and plans for preventing, protecting, and providing time sensitive responses to attacks or threats are covered in detail to insure the confidentiality, integrity, and availability of data and information throughout the organization. The complexity of attacks and blended threats is covered from a holistic security point of view to ensure that threats from advanced or multiple sources are effectively mitigated to protect sensitive information and to safeguard organizational assets.
This course covers the art and science of cyber security forensics, which is the application of investigation and analytical techniques to cyber systems to extract and preserve information that can inform cyber professionals on risk mitigation and that can legally be presented as evidence in a court of law. The course covers attack analysis in detail and provides sound investigative methods for collecting, analyzing, preserving, and interpreting cyber information and evidence. In addition to the technological aspects of cyber forensics, the course will cover the legal aspects of cyber forensics including classifications of evidence, evidence preservation, evidence tampering, discovery procedures and protocols, and case presentation in court. The course will conclude with a comprehensive case study and the techniques and processes used to construct cyber forensic reports and evidence repositories for pending cyber-criminal cases.
This course covers the basic and advanced concepts of cryptography and applies them to real world applications with a special emphasis on cyber security applications. It covers the mathematical and logical aspects of cryptographic systems and how these constructs apply to real-world applications. The course also covers basic and advanced cryptographic protocols. Ciphers, encryption, and message integrity will be studied expensively. A comprehensive study of key systems will be a major part of the class. The course will conclude with the construction of original cryptographic constructs that are applied to real world applications and tested for effectiveness and efficiency.
Data visualization provides an effective means to communicate information and tell a story of quantitative data through graphic patterns. Especially in the big-data era, data visualization makes the massive data more approachable and valuable and greatly impacts the decision-making process in fields such as healthcare, manufacturing, finance, and science. This course introduces students to the core concepts and various techniques and tools for data visualization. The course will first explore what data visualization is. The techniques of good design consideration and data preparation for the best visuals will be discussed. The course will present the elements of cognitive science theory and the principles of graphic/interaction design. It will then apply them to the visualization of information. Finally, the course will examine the appropriate forms for data representation through case studies. A variety of common and uncommon digital visualization software tools are used in the class for information exaction and presentations.
Machine learning is a complex yet a fast-moving field with many real world commercial applications. The goal of machine learning is to build computer models that can produce useful information whether they are predictions, associations, or classifications. The ultimate goal for many machine-learning researchers is to build computing systems that can automatically adapt and learn from their experience. This course will study the theory and practical algorithms, basic concepts and paradigms, key techniques, challenges, and tricks of machine learning. It also covers examples of how machine learning is used/applied today in the real world, and exposes students to the construction and use of machine learning algorithms. This course discusses recent applications of machine learning, such as to robotic control, speech recognition, face recognition, data mining, autonomous navigation, bioinformatics, and text and web data processing. It also fuses machine learning with other areas of artificial intelligence and robotics.
Frequently Asked Questions (FAQs):
The program is designed to be completed in as little as 12 months, making it a fast and efficient way to increase your marketability as a cybersecurity professional.
The total cost of the program is $9,360. This makes it an affordable way to gain specialized knowledge and skills in the in-demand field of cybersecurity.
You will learn all aspects of cybersecurity, from physical security through advanced cryptologic security, utilizing current and relevant tools. The program also provides hands-on applications in machine learning and data visualization, enabling you to perform advanced attack campaign and defense analysis, malware forensics/reverse engineering, and more.
Yes, all courses in the certificate program are reviewed on a quarterly basis to ensure that all material taught is current, relevant, and cutting-edge. This ensures you’re learning the latest techniques and tools in the field.
Completing the program will prepare you to sit for the CompTIA Security+ exam and the ISC2 CISSP exam, among other cybersecurity-centric certifications. These are highly recognized and respected certifications in the field.