Cybersecurity Certificate

Cybersecurity Certificate

Become the driving force against the potential cyber threats by earning the Cybersecurity Certificate from Westcliff University. Regardless of industry or technical background, Westcliff prepares students to effectively identify, evaluate, prepare for, and mitigate cybersecurity threats. This course provides students with the tools to evaluate and mitigate risk, including the essential cybersecurity and computer networking topics, cyber threats and vulnerabilities, fundamental cryptography, cyber defense concepts, computer forensics, incident response, and cybersecurity policies.

Start Today!

Call Now: (949) 541-9420

Overview

  • Understand the need for security as it protects people, businesses, and society
  • Grasp the issues related to cyber defense methods and mechanisms
  • Virtual networking sessions with experts and risk management
  • Live online or on-campus learning sessions in evaluating risk and cybersecurity
  • Earn up to 18 credits towards your Westcliff University degree

Objectives

The Cybersecurity Certificate Program offered by Westcliff University is a multidimensional certificate program that takes a multidisciplinary approach to attain proficiency in information technology, networking, and modern information security. 

Why Choose the Cybersecurity Certificate?

Why Choose the Cybersecurity Certificate?

  • Learn from experienced Cybersecurity experts
  • Industry driven curriculum taught by Westcliff faculty
  • Earn up to 18 credits towards your degree
  • Westcliff will cover the cost for the first attempt of the CompTIA CySA+ industry certification exam

*Our courses cover the CompTIA CySA+ content. Our students may choose to test for these certifications after successfully passing our program. We will pay for the first attempt to pass the certification, any subsequent attempts will be paid for by the student.

The Cybersecurity Certificate Program encourages students to achieve the following educational objectives:

1
Understand security information and event management
2
Identify forensics techniques
3
Manage a cyber-attack process
4
Implement incident response and business continuity plans

Course Descriptions

  • Cybersecurity Courses

    Course 1: Fundamentals of Computer Concepts & Networks This course will provide students with a general understanding of how computers function in the world today. Students will gain an understanding of how these computers operate and connect through various systems and technologies. This course will allow students to progress into the Introduction to Cybersecurity and Cryptography course.

    Course 2: Introduction to Cybersecurity & Cryptography The internet has changed dramatically, so have the activities that are dependent on it in some shape or form. Understanding the need for security, its influence on people, businesses and society, as well as business drivers is critical. This course also covers malicious attacks, threats, and vulnerabilities common to the world of security, as well as access controls and methods to assess and respond to risks. Hands-on labs accompany the various concepts that are taught.

    Course 3: Cyber Controls, Threats & Vulnerabilities This course provides students with a solid understanding of various types of physical and logical cyber threats common today. The importance of anonymity is heavily discussed throughout the class, as well as various types of social engineering methods and attacks.

    Course 4: Emerging Technologies in Cyber Security Privacy and security are two of the most important topics in this new world of technology. In order to confront and overcome many of the technological challenges we now encounter, we must be familiar with the various types of threats and attacks that impact the world today. It is imperative to understand the fundamentals of the cyber concepts and topics. The objective of this course is to understand the various issues we have that relate to cyber defense methods and mechanisms.

    Course 5: Digital Forensics & Incident Response This course will cover many different areas and is designed for those with no prior knowledge in Digital Forensics but who actively use computers and want to step into this field of cybersecurity. The course contains weekly hands-on labs/forensics challenges that are hosted in virtual Windows and Linux computers. Students taking the course will learn how to: clone media, calculate a hash, analyze an operating system, recover deleted files, detect hidden data within a file system, and analyze network traffic. In addition to the technical topics, students will also learn about Ethics in regards to Digital Forensics and legal aspects such as chain of custody and litigation.

    Course 6: Essentials of Information Security Management This course introduces the broad domain of information security management. The course's goal is to make the students exposed to as many information security management topics as possible in 8 weeks. Technical vulnerability management, risk analysis, management & mitigation, compliance, business impact analysis, and incident response are among the topics covered in this course. Students practice all of these security management topics by completing lab assignments and reinforce their knowledge in discussions each week.

  • What projects will I work on during this program?

    You will complete hands-on labs to ensure you have the skills to recognize, identity, and mitigate cyber attacks.

Frequently Asked Questions

Course Descriptions