Cybersecurity talent is at a premium. Immerse yourself in a strong foundation of concepts, policies, technologies, and real-world analysis to help protect our digital information and drive the next advancement in your cybersecurity career. Learn from real-world practitioners while gaining knowledge, skills, and abilities that will immediately translate into the workforce.
Fast-track your way through the program, or take your time and complete at your leisure. The courses in this program are offered as continuous enrollment. This means that the courses are open for the entire quarter, available to enroll in and begin at any time. Simply complete the coursework by the last day of the course as stated on your enrollment verification, and kick start your career in cybersecurity.
Need on-the-job experience? Apprenticeship opportunities may be available. Chat with us or schedule a meeting with a student success coach to learn more.
*Duration times can vary talk to your student success coach for more information.
Total Units 6 Units
Essential concepts and terminology in cybersecurity
Assessment of vulnerability and best practices using real-world examples
Installation of network components and utilization of security tools for assessing risk
Methods to troubleshoot network security issues
Installation and best practices of databases security and use of SQL Server to protect it
Practical application of all concepts learned, from identifying assets at risk to applying appropriate technologies to protect them
Those interested in a career in cybersecurity
Those currently holding a position in cybersecurity
IT professionals who want to learn more about securing networks and defense against cyber-attacks
Save 20% on the entire program tuition by paying in full upfront. To choose this option, click "Apply Now" from the Get Started menu at the top of the page.
Pay per individual course as you register. To choose this option, click "Enroll in a Course" from the Get Started menu at the top of the page. *If you plan to earn the certificate, you will need to apply before completing your last course.
Cybersecurity Technologies and ToolsAn introduction to installing network components that can help support enterprise security, including firewalls, routers, switches, proxies, VPN concentrators, and other pieces of network security.
Securing DatabasesThis course consists of two parts, database security principles and the most common security vulnerabilities faced by databases today, and an introduction to building secure applications in SQL Server.