Offer Protection on the Back End
From the online graduate certificate in Cybersecurity Technology from Saint Mary's University of Minnesota, you'll develop the skills to introduce and maintain network protections for organizations across an array of industries. As a result, you'll engage with and understand more deeply the central tenets of providing effective cybersecurity infrastructure planning.
Learn How to Protect Digital Assets
In the online Graduate Certificate in Cybersecurity Technology, you'll gain the knowledge base to reinforce organizations' networks with practical, comprehensive security strategies. From faculty with real-world experience in the field, you'll engage with topics that include intrusion detection, incident response, and network security as you prepare to enter the field.
Additionally, the online certificate program is designed to help you understand the ins and outs of developing and sustaining an effective security policy. Ultimately, the program will equip you with the skills to protect information resources, identify security vulnerabilities, and plan for potential cyberattacks on networks.
Enhance Your Education with Saint Mary's Accelerators
Saint Mary's offers a selection of graduate certificate programs designed to accelerate your degree and help you achieve your goals faster. Customize your education and get a glimpse of graduate coursework by stacking Saint Mary's Accelerators, each of which requires the completion of 12–15 credits and adds only six additional credits to your degree program. Complete extra credentials and gain a competitive edge for your field while saving time and money.
Additionally, several certificate programs also offer Credly badging for each course. These badges serve as a graphic representation of the skills you gained by completing a specific course or graduate certificate program. They can be displayed on social media platforms like LinkedIn and your CV and resume to visually showcase your specific leadership knowledge and skills to current and potential employers, credentialing programs, and admissions offices.
One of the hallmarks of our “accelerators” is that they are stackable into or onto full degree programs. Students can pursue a graduate certificate and then decide to continue into a full degree program in the same or a different discipline.
-Michelle Wieser, Ph.D., Dean of the School of Business and Technology
To learn more about Saint Mary's graduate certificates check out this interview with Michelle Wieser.
Curriculum
The coursework in the online Graduate Certificate in Cybersecurity Technology is structured to accommodate students who want a more nuanced introduction to the hard technology skills necessary for success in the field. As a result, you will cover topics that include data privacy, ethical hacking, and network security to give you a more real-world understanding of your responsibilities in the industry.
For current degree requirements, visit the Saint Mary's University of Minnesota Course Catalog.
Certificate Courses
Prerequisite Course
Students who have not taken a foundational computer networking course and/or lack previous experience in the networking technology field may be required to take CYBR 590 Computer Networking (3 cr.) as part of their program.
CYBR600 Foundations of Cybersecurity (3 cr.) (required first course)
This course provides an overview and foundational understanding of concepts essential to the cybersecurity professional to evaluate best practices in implementing security systems within the enterprise. This course covers key bodies of knowledge in security, privacy, and compliance. Topics include security planning, risk management, security technologies, basic cryptography, digital forensics, application security, intrusion detection and prevention, physical security, and privacy issues.
Upon completion of the course, students are expected to be able to do the following:
- Apply the principles of information technology security.
- Analyze situations of computer and network usage from a security perspective to develop a security mindset.
- Explain information security’s importance in our increasingly computer-driven world.
- Identify appropriate strategies to ensure confidentiality, integrity, and availability of information.
- Express management’s role in the development, maintenance, and enforcement of an information security program.
- Describe the relationship among laws, regulations, and professional issues in information security.
- Articulate how cryptography serves as the central language of information security.
- Analyze how physical security fits within an information security program.
- Define the roles of computer forensics in information security.
- Apply basic software tools for assessing the security posture of a business.
- Explain how issues of privacy relate to business information security.
CYBR606 Cloud Architecture and Application Security (3 cr.)
Prerequisite(s): CYBR600
This course introduces the domains of cloud security in both theoretical and practical applications. Students are presented with a structured approach to cloud architecture and design requirements along with applications involved in developing layered cloud security strategies. Students evaluate the data organization, data security, cloud applications, operations, and compliance used in deploying cloud-based security architecture that supports the objectives of the enterprise.
Upon completion of the course, students are expected to be able to do the following:
- Create a plan for an organization’s strategic security objectives.
- Apply architectural frameworks and design principles.
- Identify methods, roles, responsibilities, and accountabilities of personnel governing compliance of security policies.
- Evaluate data security strategies and data classification controls.
- Differentiate cloud-based security models.
CYBR610 Network Security and Intrusion Detection (3 cr.)
This course provides a comprehensive overview of network security and intrusion detection. Students focus on methods for securing networks, and utilize these methods in basic architectural design. Students will apply these methods to a cohesive network security strategy. Topics include investigation of areas such as network analysis, perimeter defense strategies, network monitoring, vulnerability and intrusion detection, and security in mobile and wireless environments.
Upon completion of the course, students are expected to be able to do the following:
- Implement secure design principles in network architectures.
- Integrate secure network components through knowledge of the operation of hardware, transmission media, network access control devices, endpoint security, and content distribution networks.
- Implement secure communication channels according to design that involve voice, multimedia collaboration, remote access, data communications, and virtualized networks.
- Specify procedures to recover from attacks on network systems.
- Conduct logging and monitoring activities to support intrusion detection and prevention, and event management.
- Identify threats and vulnerabilities in networked systems.
CYBR650 Ethical Hacking and Defense (3 cr.)
This course includes a study of theoretical and practical aspects of network and web application penetration testing. Students are able to evaluate the security of a network or system's infrastructure and outline how hackers find and attempt to exploit any vulnerabilities. Included in the course are in-depth details on ethical hacking, including reconnaissance, vulnerability assessment, exploitation, maintaining access and covering tracks. Current tools and methodologies are stressed.
Upon completion of the course, students are expected to be able to do the following:
- Explain the regulatory/legal requirements and rationale for penetration testing.
- Interpret and differentiate cyber threats and exploits in a penetration testing context.
- Distinguish key phases of ethical hacking: reconnaissance, scanning, gaining access, maintaining access, and covering the tracks.
- Perform protocol analysis using packet captures and analysis data using a network sniffer.
- Investigate and uncover network devices, operating systems, and services.
- Discover network security issues using an intrusion detection tool.
- Leverage penetration testing applications to recognize information targets across operating systems and services.
- Implement scripts and tools to assist in penetration testing.
- Deploy and test exploits targeting operating systems and services.
- Identify and exploit various vulnerabilities in web applications.
DIGA625 Python Programming for Technology Applications (3 cr.)
The course focuses on core programming concepts such as classes and objects, controlling flow, batch processing, and error handling while working in the context of data processing, analysis, and visualization. The course explores a variety of Python packages and integration for project development. Using Python to automate workflows and create custom visualizations is discussed, and students are able to explore tabular data, spatial data, and/or cybersecurity applications of Python.
Upon completion of the course, students are expected to be able to do the following:
- Develop custom visualizations that communicate data and results of an analysis.
- Respond to specific scripting requirements to address analytical problems and improve workflows.
- Apply the concepts and logic of object-oriented programming.
Certificate Outcomes
In this program, you'll learn how to:
- Balance business needs and initiatives with an effective security architecture strategy
- Communicate technical information digestibly to non-technical audiences
- Identify vulnerabilities in networks and computer systems
- Apply effective security measures to mitigate potential threats
- Conduct security control testing to protect sensitive information and data
Launch Your Career in Cybersecurity: Career Outlook
As more employers aim to protect their sensitive information, there has been a palpable rise in the need for trained, qualified cybersecurity professionals in practically every industry. Employers from the private sector to nonprofit organizations and governmental agencies are looking for help securing their data. According to the Bureau of Labor Statistics, information security analyst jobs are expected to grow by 31% through 2029. These analysts earn an average salary of $99,730 per year.1
- Security Operations Center Manager
- Cybersecurity Engineer
- Data Security Analyst
- Threat Response Analyst
- Application Security Engineer
Admission Requirements
To apply for the online graduate certificate in Cybersecurity Technology from Saint Mary's University of Minnesota, you can submit an online application, mail a hard copy, or meet with a Saint Mary's enrollment counselor in person. Your application must include the following items:
- An undergraduate degree from a regionally accredited institution
- A minimum GPA of 2.75 on a 4.0 scale
- A written statement: Your background and future goals all impact your success with Saint Mary's and inform your education. As you prepare your written statement, think about including previous experiences, education, and your strengths and interests. Share your motivations for earning the online artificial intelligence certification and how it will contribute to your career.
- Two email and phone references: Please provide contact information for two individuals who can speak to your professional and academic abilities.
- A current resume: Include both your educational and professional experience.
- If your overall GPA is below 2.75, you may receive conditional status in the program at the discretion of the program director.