Cybersecurity Technology Graduate Certificate Online - SMU Skip to Main Content


First year students deposit here

page-builder.php
  1. Home
  2. /
  3. Online Graduate Certificate In...

Online Graduate Certificate in Cybersecurity Technology

Learn How To Protect Digital Assets

Develop the skills to introduce and maintain cybersecurity and technology requirements for organizations across various industries with the online graduate certificate in Cybersecurity Technology from Saint Mary’s University of Minnesota. The program delivers a deep understanding of cybersecurity infrastructure, cloud architecture, programming/ethical hacking techniques, and advanced network security applications.

The online certificate program is designed to help provide you the hands-on skills necessary to become a cybersecurity professional and grow your security credentials by practicing cybersecurity and understanding effective security practices by building hands-on applied learning techniques. You’ll complete the program equipped with the skills to protect information resources, identify security vulnerabilities, and plan for potential cyberattacks on networks while gaining experience in direct preparation for the CySA+/Security+/Network+ and other CompTIA and CISSP/CISM certifications.

After completing your graduate certificate in Cybersecurity Technology online, you may continue advancing your skills by transferring your credits to a master’s degree program and completing your education faster.

Read More

15

credits

$760

per credit

3

semesters

AugJanMay

start dates

Online

15

credits

$760

per credit

3

semesters

AugJanMay

start dates

Online

Why Choose the Online Graduate Certificate in Cybersecurity Technology?

Earning your graduate certificate in Cybersecurity Technology online allows you to study on your schedule from the location of your choice. Whether you’re on the go or prefer to study in the comfort of your home, our online learning platform offers the flexibility you need to access your courses from wherever you choose. You’ll explore a challenging curriculum and receive personalized instruction from faculty on your time.

Program Highlights

  • CISSP and CISM Certification Preparation
  • Network+, Security+, and CySA+ Certification Preparation 
  • Apply Graduate Certificate Credits to an M.S. in Cybersecurity
  • Course Topics Include Security Infrastructure, Cloud Security Architecture, Programming/Ethical Hacking Techniques, and Cybersecurity Analyst Functions
  • No Letters of Recommendation Required
  • Official CompTIA Authorized Academic Partner 

Courses & Requirements

The coursework in the online graduate certificate in Cybersecurity Technology is structured to accommodate those who want a more nuanced introduction to the hard technology skills necessary for success in the field. The five courses (15 credits) explore data privacy, ethical hacking, and network security to give you a more real-world understanding of your responsibilities in the industry.

  • Students who have not taken a foundational computer networking course and/or lack previous experience in the networking technology field may be required to take CYBR 590 Network Technology and Infrastructure (3 cr.) as part of their program. These credits do not apply to the Cybersecurity M.S. program nor to the certificate.

  • Prerequisite Course

    Students who have not taken a foundational computer networking course and/or lack previous experience in the networking technology field may be required to take CYBR 590 Computer Networking (3 cr.) as part of their program.

    This course provides an overview and foundational understanding of concepts essential to the cybersecurity professional to evaluate best practices in implementing security systems within the enterprise. This course covers key bodies of knowledge in security, privacy, and compliance. Topics include security planning, risk management, security technologies, basic cryptography, digital forensics, application security, intrusion detection and prevention, physical security, and privacy issues.

    Upon completion of the course, students are expected to be able to do the following:

    • Apply the principles of information technology security
    • Analyze situations of computer and network usage from a security perspective to develop a security mindset
    • Explain information security’s importance in our increasingly computer-driven world
    • Identify appropriate strategies to ensure confidentiality, integrity, and availability of information
    • Express management’s role in the development, maintenance, and enforcement of an information security program
    • Describe the relationship among laws, regulations, and professional issues in information security
    • Articulate how cryptography serves as the central language of information security
    • Analyze how physical security fits within an information security program
    • Define the roles of computer forensics in information security
    • Apply basic software tools for assessing the security posture of a business
    • Explain how issues of privacy relate to business information security

  • This course introduces the domains of cloud security in both theoretical and practical applications. Students are presented with a structured approach to cloud architecture and design requirements along with applications involved in developing layered cloud security strategies. Students evaluate the data organization, data security, cloud applications, operations, and compliance used in deploying cloud-based security architecture that supports the objectives of the enterprise.

    Upon completion of the course, students are expected to be able to do the following:

    • Create a plan for an organization’s strategic security objectives
    • Apply architectural frameworks and design principles
    • Identify methods, roles, responsibilities, and accountabilities of personnel governing compliance of security policies
    • Evaluate data security strategies and data classification controls
    • Differentiate cloud-based security models

  • Prerequisite(s): CYBR590 Network Technology and Infrastructure

    This course provides a comprehensive overview of network security and intrusion detection. Students focus on methods for securing networks, and utilize these methods in basic architectural design. Students apply these methods into a cohesive network security strategy. Topics include investigation of areas such as data analysis and interpretation, threat/intrusion detection, vulnerability management, incident response and security architecture. The course also prepares students for the CompTIA CySA+ Certification Exam.

    Upon completion of the course, students are expected to be able to do the following:

    • Implement security operations and monitoring design principles in network architectures
    • Integrate software and systems security components through knowledge of hardware, transmission media, cryptography, network access, honeypot, endpoint security, and content-distribution networks
    • Implement secure communication channels according to design that involve voice, multimedia collaboration, remote access, data communications, and virtualized networks
    • Specify incident response and forensic procedures to recover from attacks on network systems
    • Conduct logging and monitoring activities to support intrusion detection and prevention, and event management
    • Identify threats and vulnerabilities in networked systems
    • Understand compliance and assessment practices

  • The course focuses on core programming concepts such as classes and objects, controlling flow, batch processing, and error handling while working in data processing, analysis, and visualization. The course explores a variety of Python packages and integration for project development. Using Python to automate workflows and create custom visualizations is discussed, and students can explore tabular data, spatial data, and/or cybersecurity applications of Python.

    Upon completion of the course, students are expected to be able to do the following:

    • Develop custom visualizations that communicate data and results of an analysis
    • Respond to specific scripting requirements to address analytical problems and improve workflows
    • Apply the concepts and logic of object-oriented programming

  • This course includes a study of theoretical and practical aspects of network and web application penetration testing. Students are able to evaluate the security of a network or system’s infrastructure and outline how hackers find and attempt to exploit any vulnerabilities. Included in the course are in-depth details on ethical hacking, including reconnaissance, vulnerability assessment, exploitation, maintaining access, and covering tracks. Current tools and methodologies are stressed.

    Upon completion of the course, students are expected to be able to do the following:

    • Explain the regulatory/legal requirements and rationale for penetration testing
    • Interpret and differentiate cyber threats and exploits in a penetration testing context
    • Distinguish key phases of ethical hacking: reconnaissance, scanning, gaining access, maintaining access, and covering the tracks
    • Perform protocol analysis using packet captures and analyze data using a network sniffer
    • Investigate and uncover network devices, operating systems, and services
    • Discover network security issues using an intrusion detection tool
    • Leverage penetration testing applications to recognize information targets across operating systems and services
    • Implement scripts and tools to assist in penetration testing
    • Deploy and test exploits targeting operating systems and services
    • Identify and exploit various vulnerabilities in web applications

Share Your Success

Saint Mary’s supports your success by providing you with the tools necessary to not only achieve your professional goals but to share them with the world—especially the digital world.

As part of our commitment, Saint Mary’s offers an opportunity for you to be awarded digital badges. Digital badges are a graphic verification representing your achievement after completing a specific online course or program.

Admissions

The online graduate certificate in Cybersecurity Technology program is financial aid eligible and can be completed in three semesters. No prerequisite coursework is required, and you don't need GRE/GMAT scores to apply. For admission to the program, you'll need:

  • General:

    • An undergraduate degree from a regionally accredited institution
    • A minimum GPA of 2.75 on a 4.0 scale
    • If your overall GPA is below 2.75, you may receive conditional status in the program at the discretion of the program director

  • Students who have not taken a foundational computer networking course and/or lack previous experience in the networking technology field may be required to take CYBR 590 Computer Networking (3 cr.) as part of their program.

  • You don’t need GRE/GMAT scores to apply for this program.

  • Transfer credits are not accepted for this program.

  • Students with transcripts from universities outside the United States, the United Kingdom, Ireland, New Zealand, Australia, and Canada (except for the Quebec Province) must take and pass English proficiency testing

    • Test of English as a Foreign Language (TOEFL) with a minimum score of 72
    • International English Language Testing System (IELTS) with a minimum score of 6.0
    • Michigan Language Assessment Battery (MELAB) with a minimum score of 74%
    • International Test of English Proficiency (ITEP) with a minimum score of 4.0 or Pearson Test of English with a score of 51
    • Duolingo with a minimum score of 100

  • Whether you apply through our online application via hard copy, or in-person with a Saint Mary’s admissions counselor, your application must include the following items:

    Official transcripts: An official transcript issued to Saint Mary’s University of Minnesota from the institution posting the applicant’s completed degree and other relevant transcripts documenting program prerequisites and potential transfer credits must be sent separately and directly from your institution. Saint Mary’s University of Minnesota accepts official transcripts electronically from previously attended institutions. Transcripts should be sent to oladmissions@smumn.edu or mailed to:

    Transcript Processing Center
    Saint Mary’s University of Minnesota
    851 Trafalgar Court, Suite 420
    Maitland, FL 32751

    An up-to-date résumé: Include both your educational and professional experience.

    Two references: Provide the names of two people (including title, organization, email, and phone number) who can serve as professional references, if needed, during the application review process. The best references are those who know you professionally, such as current or former supervisors.

    A written statement: Your background and future goals impact your success with Saint Mary’s and inform your education. As you prepare your written statement, think about including previous experiences, education, and your strengths and interests. Share your motivations for earning the online cybersecurity technology certification and how it will contribute to your career.

  • Upcoming application deadlines for Saint Mary’s online Cybersecurity Technology Graduate Certificate:

    • Spring: December 18, 2023
    • Summer: April 22, 2024
    • Fall: August 20, 2024

  • Upcoming start dates for Saint Mary’s online Cybersecurity Technology Graduate Certificate:

    • Spring: January 8, 2024
    • Summer: May 6, 2024
    • Fall: September 3, 2024

  • Once you’ve submitted your application, expect to be notified about acceptance approximately two weeks after your submission date.

Tuition & Fees

A college education is invaluable. You can take it wherever you want to go or as far as you want to go. The cost of quality education should not get in the way of reaching your goals. Here at Saint Mary’s, we are committed to providing an accessible, quality education that is focused on enhancing your personal and professional growth. Explore cost breakdowns for tuition and other fees of the online Cybersecurity Technology certificate.

Online Graduate Certificate in Cybersecurity Technology Careers & Salary

As more employers aim to protect their sensitive information, there has been a palpable rise in the need for trained, qualified cybersecurity professionals in practically every industry. Employers from the private sector to nonprofit organizations and governmental agencies are looking for help securing their data.

Computer and information technology employment is projected to grow 15 percent from 2021 to 2031, faster than the average for all occupations.1 The employment of information security analysts is projected to grow 35 percent from 2021 to 2031, with an average of 19,500 openings each year.2

Cybersecurity Engineer

$98,4693

Information Security Analyst

$102,6002

Cybersecurity Analyst

$77,3774

Information Security Manager

1196315

Data Security Analyst

$74,0596

What You'll Learn

As a graduate of this program, you will be able to:

  • Balance business needs and initiatives with effective security architecture
  • Communicate technical information digestibly to non-technical audiences
  • Identify vulnerabilities in networks and computer systems
  • Apply effective security measures to mitigate potential threats
  • Conduct security control testing to protect sensitive data

Frequently Asked Questions

Saint Mary's University of Minnesota is accredited by the Higher Learning Commission.

You may apply for admission to Saint Mary's online Cybersecurity Technology Graduate Certificate program anytime. After you are admitted, you may begin taking online classes at the start of any semester: Spring, Summer, or Fall.

No. Transfer credits are not accepted for graduate certificates.

No. As long as you submit your assignments by the time they are due, you can work and study when it is convenient.

Applicants must hold a bachelor’s degree from a regionally accredited institution, along with a GPA of at least 2.75 on a 4.00. Further information about admissions requirements and the application process can be found in the admissions section on this page.

All of the support systems available to on-campus students at Saint Mary's are also available for online learners. If you need academic support, a team of advisers is ready to assist. Professors are just a phone call or email away. Every online Saint Mary's student is paired with a dedicated student services coordinator who will ensure your educational and professional goals stay on track. Technical support is also available to online students 24/7 at 877-308-9954 ext. 3.

It's easy! Your journey to a more rewarding career starts by calling 877-308-9954 to speak with an enrollment counselor. Or, you can request more information, and we'll reach out to you. If you already know Saint Mary's University of Minnesota is the right place to earn your online Cybersecurity Technology Graduate Certificate, go ahead and begin the Online Application Process.

No. The certificate you earn online from Saint Mary's is identical to the one offered on campus.

To earn your online Cybersecurity Technology Certificate, you will complete 15 credit hours of program work. You'll be able to complete your coursework in as little as three semesters.

The program is entirely online.

No, these are instructor-led courses. While there are no set class times, there are assignments with set due dates.

Yes. Certain coursework requires software that is only compatible with a Windows-based PC, and will not properly work on a Mac computer (Apple iOS). Therefore, to be successful in the program, you will either need to use a Windows-based PC or partition your Mac so that the required Windows OS software is available.

Yes. Many types of financial aid are available to those who qualify. To discuss tuition rates and financial aid options, call 877-308-9954 to speak with an enrollment counselor.

Sources

  1. Bureau of Labor Statistics. “Computer and Information Technology Occupations.” September 8, 2022. Retrieved August 11, 2023, from https://www.bls.gov/ooh/computer-and-information-technology/home.htm.
  2. Bureau of Labor Statistics. “Information Security Analysts.” September 8, 2022. Retrieved August 11, 2023, from https://www.bls.gov/ooh/computer-and-information-technology/information-security-analysts.htm.
  3. Payscale. “Average Cyber Security Engineer Salary.” July 4, 2022. Retrieved July 14, 2022, from https://www.payscale.com/research/US/Job=Cyber_Security_Engineer/Salary.
  4. Payscale. “Average Cybersecurity Analyst Salary.” June 28, 2022. Retrieved July 13, 2022, from https://www.payscale.com/research/US/Job=Cyber_Security_Analyst/Salary.
  5. Payscale. “Average Information Security Manager Salary.” June 26, 2022. Retrieved July 13, 2022, from https://www.payscale.com/research/US/Job=Information_Security_Manager/Salary.
  6. Payscale. “Average Data Security Analyst Salary.” June 22, 2022. Retrieved July 13, 2022, from https://www.payscale.com/research/US/Job=Data_Security_Analyst/Salary.