Applicants apply for admission to the program via the Graduate School application for admission. Requirements listed here are in addition to Graduate Council policies listed under GCAC-300 Admissions Policies. International applicants may be required to satisfy an English proficiency requirement; see GCAC-305 Admission Requirements for International Students for more information.
A bachelor's degree in a related area (e.g., engineering and science), while not necessary for admission, is helpful in the successful completion of the certificate. It is expected that students will have a basic level of competency in computer language and information technology (related work experience can be used to demonstrate such competency). GRE scores are not required for nondegree graduate students.
Requirements listed here are in addition to requirements listed in Graduate Council policy GCAC-212 Postbaccalaureate Credit Certificate Programs.
To be awarded the certificate, students must successfully complete 15 credits of course work. A 3.0 GPA must be obtained in order to successfully complete the certificate.
|IST 815||Foundations of Information Security and Assurance||3|
|IST 554||Network Management and Security||3|
|Select 9 credits from the following courses:||9|
|Computer and Cyber Forensics|
|Information Security Management|
|Crisis, Disaster and Risk Management|
|Web Security and Privacy|
Graduate courses carry numbers from 500 to 699 and 800 to 899. Advanced undergraduate courses numbered between 400 and 499 may be used to meet some graduate degree requirements when taken by graduate students. Courses below the 400 level may not. A graduate student may register for or audit these courses in order to make up deficiencies or to fill in gaps in previous education but not to meet requirements for an advanced degree.
- to solve practical problems. Integrate the use of disciplinary methods, techniques, and knowledge
- PROFESSIONAL PRACTICE: Make use of ethical standards and principles of integrity as a foundation in decision-making.
- THINK: Search, evaluate, and synthesize literature to integrate cyber security principles into disciplines and professional fields.
|Graduate Program Head||Mary Beth Rosson|
|Director of Graduate Studies (DGS) or Professor-in-Charge (PIC)||David Joseph Fusco|
Christina Marie Fitzgerald