• Enrollment system is currently unavailable. We apologize for the inconvenience. Please try again later.

Advanced Diploma Advanced Diploma in Cybersecurity

Apply Now

Program Description

Use of the Internet, web technologies, and mobile devices, along with wireless/cellular connectivity, provides easy access to online information and resources. The openness and anonymity of the Internet and its underlying technologies are increasingly being abused by hackers and criminals for fraud, identity theft, and other criminal enterprises. With the ubiquity of online commerce and data transfer and storage, hackers are launching sophisticated attacks to exploit systems. The Advanced Diploma in Cybersecurity addresses both principles and practices of Internet and network security, providing hands-on experience in security-related tools and technologies for a better understanding of these threats and vulnerabilities, as well as the various security countermeasures.

With employment of information security analysts projected to grow by 18 percent from 2014 to 2024, which is much faster than the average for all occupations, demand for information security analysts is expected to be very high, as they will be needed to create innovative solutions that prevent hackers from stealing critical information and causing problems for computer networks.

Taught by experienced security professionals with extensive field knowledge, the courses in this program combine lectures and hands-on labs. As a participant in this diploma, you will gain an understanding of attackers’ motivations and methodologies, in addition to competency with many of the tools that hackers used to exploit vulnerabilities and compromise systems. You will learn how to prepare for, detect, and defend critical infrastructure and data from these attacks using a variety of approaches and technical solutions.

Work Product

As a student in this program, you will be required to create a portfolio of assignments that showcase your understanding of, and ability to apply, cybersecurity concepts. The portfolio will consist of resources that demonstrate your ability to:

  • Successfully attack a vulnerable system using customized hacking tools
  • Properly investigate a cybersecurity incident to include live analysis of malware and a forensics review using end point and network-based evidence
  • Organize their findings and present them to both technical and nontechnical audiences

You also will need to complete both a pen tester project and a forensics project. Instructors and other industry experts who are active in the field will prepare both hacker and forensics exercises and pose them as challenges. These will simulate real-world scenarios in which corporate customers engage a pen tester to hack into their network, or a forensics examiner to review a compromised system within their environment.

For the pen tester project, you will need to produce an appropriate industry-quality report to describe your assessment of the vulnerabilities of the target. This report will describe all phases of the project and provide detailed recommendations to assist the customer in remediation efforts. Vulnerabilities should be described using a variety of criteria, including level of severity, ease of exploit, and business impact if exploited. The pen tester report will contain the following sections:

  • Introduction
  • Executive Summary of the Project
  • Project Scope and Approach
  • Systems and Network Services Discovered
  • Verified High-Risk Vulnerabilities
  • Verified Medium-Risk Vulnerabilities
  • Verified Low-Risk Vulnerabilities
  • Results and Conclusions

For the forensics project, you will need to produce an appropriate industry-quality report to describe your review of the compromised system. This report will describe all phases of the investigation and will comply with industry standards for forensic soundness. The forensics report will contain the following sections:

  • Introduction
  • Executive Summary of the Investigation
  • Digital Forensic Investigation Objectives
  • Investigation Scope
  • Evidence Reviewed
  • Digital Forensic Investigation Methodology
  • Detailed Investigation Findings
  • Digital Forensic Investigation Conclusions

 

Job Skills

  • An understanding of common vulnerabilities in operating systems, architecture, and applications, and knowledge of how to use the latest tools and techniques to exploit those vulnerabilities
  • The proper way to perform forensic acquisition of compromised systems
  • The ability to perform live, static, and dynamic analysis of malware
  • Knowledge of how to prevent common Internet attacks
  • The skills to design and build trusted systems

 

Job Titles

  • IT Auditor
  • Offensive Security Engineer (Penetration Tester or Pen Tester)
  • IT Security Engineer
  • Incident Response Engineer
  • IT Forensics Examiner

Tuition: $3,500

Duration

2 semesters

You'll Walk Away With

  • The ability to perform network and application hacking to detect and exploit vulnerable systems
  • Mastery of the TCP/IP packet, including the ability to craft rogue packets
  • The competencies to detect malicious code and network activity
  • The skills to properly conduct an investigation into a cybersecurity breach
  • A comprehensive understanding of cybersecurity best practices and risk mitigation approaches

Required Program Curriculum

hand selected to give you the skills and training you need to start your new career

Cybersecurity: Essentials

Gain an introduction to cybersecurity core concepts: risk, governance, access control, incident response, auditing and monitoring, and recovery.

2017 Summer
1 section

Cybersecurity: Hacking Understood

In class, assume the role of hacker and use the latest tools and techniques to attack a system.

2017 Summer
1 section

Cybersecurity: Defending Technology Assets

Learn about various solutions that are used to secure networks, and become familiar with forensics reviews of security incidents.

2017 Summer
1 section

Cybersecurity: Advanced Topics

In this lab-based course, learn about advanced Windows exploitation techniques, advanced web attacks, and advanced malware analysis.

2017 Summer
1 section

JobFocus: Cybersecurity

Gain a better understanding of long-term career management topics in cybersecurity.

2017 Summer
1 section

General Admission Requirements

For those who have earned a college degree
• B.A. or B.S. degree or equivalent
• Résumé
• Contact information for one reference

Cybersecurity: Essentials

Gain an introduction to cybersecurity core concepts: risk, governance, access control, incident response, auditing and monitoring, and recovery.

2017 Summer
1 section

Cybersecurity: Hacking Understood

In class, assume the role of hacker and use the latest tools and techniques to attack a system.

2017 Summer
1 section

Cybersecurity: Defending Technology Assets

Learn about various solutions that are used to secure networks, and become familiar with forensics reviews of security incidents.

2017 Summer
1 section

Cybersecurity: Advanced Topics

In this lab-based course, learn about advanced Windows exploitation techniques, advanced web attacks, and advanced malware analysis.

2017 Summer
1 section

JobFocus: Cybersecurity

Gain a better understanding of long-term career management topics in cybersecurity.

2017 Summer
1 section