Big data needs big protection. As computer networks grow, so does the quantity of vulnerable information. 90 percent of the world’s data was created just within the last two years, and that data provides a wealth of insight at our fingertips, but it can also be detrimental in the wrong hands. As global trade becomes increasingly digital, the risks continue to rise. News of large-scale cybersecurity threats and cyber-attacks dominate the headlines all too often in today’s information age; big-brand companies losing data, being hacked, or otherwise losing out to online hackers. As we continue to gather, process, and transmit these vast amounts of data, the need to defend and protect it becomes critically important.

Throughout this 24 week intensive program, you will gain experience with a host of popular tools such as Wireshark, Kali Linux, Metasploit, Nessus, and more. You will learn skills applicable to certifications such as the CompTIA Security+ and Certified Ethical Hacker (CEH), and benefit from a comprehensive set of career services to help equip you for success as you work to change career paths or advance in your current position.

Designed For

Individuals looking to expand their knowledge in cybersecurity; technical professionals who want to better understand how to keep data secure; managers in charge of monitoring the confidentiality, availability, and integrity of client data; or those looking to get their feet wet in the world of networking and security.

What You'll Learn

  • How to identify suspicious patterns of user behavior to identify bots, intruders, and other malicious actors
  • Methods to analyze malware to identify its origin and purpose, and determine methods for uninstalling it
  • How to perform Python programming along with Bash and scripting
  • Best practices for conducting vulnerability assessments using tools like Metasploit to profile an application for vulnerabilities, and then exploit those vulnerabilities

What You Can Do With This Certificate

Positions are available in a variety of industries all over the world, and can be found in private firms, corporations, government, or nonprofit organizations. They might include:

  • Information Security Analyst
  • Information Security Officer
  • Information Security Specialist
  • Network Security Analyst
  • Data Security Administrator

Additional Details


Required fields are indicated by .