Gather Here. Go Far

NSU is where success begins. Here professors know their subjects and how to get you ready for a career after you graduate. We empower individuals to become socially responsible global citizens by creating and sustaining a culture of learning and discovery.

Gather Here. Go Far

NSU is where success begins. Here professors know their subjects and how to get you ready for a career after you graduate. We empower individuals to become socially responsible global citizens by creating and sustaining a culture of learning and discovery.

Gather Here. Go Far

NSU is where success begins. Here professors know their subjects and how to get you ready for a career after you graduate. We empower individuals to become socially responsible global citizens by creating and sustaining a culture of learning and discovery.

Gather Here. Go Far

NSU is where success begins. Here professors know their subjects and how to get you ready for a career after you graduate. We empower individuals to become socially responsible global citizens by creating and sustaining a culture of learning and discovery.

Gather Here. Go Far

NSU is where success begins. Here professors know their subjects and how to get you ready for a career after you graduate. We empower individuals to become socially responsible global citizens by creating and sustaining a culture of learning and discovery.

Certificate in Cyber Security

Cybersecurity, also known as Information Security, is the protection of data and personally identifiable information from malicious attacks, theft, and destruction. Failures of cybersecurity policies, both in large corporations and governmental agencies, have earned significant visibility and negative publicity in recent months and years. As the amount of data being stored continues to increase, and as hackers become more sophisticated, the need for cybersecurity is greater than ever.

This Certificate in Cybersecurity offers lessons on the critical elements of information security, as well as foundational information about key certifications for professionals in the industry. Each of the eight courses in this suite will help learners master the vocabulary of the industry and offers examples, videos, interactive games, and review questions to ensure mastery of the material.

Courses can be taken in any order. Upon successful completion, you can download and print a Certificate of Completion.

Key Features

  • Expert-supported
  • Mobile-friendly
  • Accessible Badge and
  • credit-awarding Games & Flashcards
  • Video content
  • Real-world case studies
  • Audio-enabled in app

Refund Policy
You may request a refund up to 5 days from the purchase date. The registration fee will only be refunded if less than 10% of each course in the certificate has been completed. Completion percentage can be viewed on the Course Progress page from within the course.

Notes
All courses in this certificate have an "Ask the Expert" feature, which submits your questions directly to an expert in the field you are studying. Questions are answered as quickly as possible and usually within 24 hours.

This course does not require any additional purchases of supplementary materials.

Learners must achieve an average test score of at least 70% to meet the minimum successful completion requirement and qualify to receive IACET CEU credit. Learners will have three attempts at all graded assessments.

Courses included in this suite

  • Asset Security
  • Communication and Network Security
  • Identity and Access Management
  • Security and Risk Management
  • Security Assessment and Testing
  • Security Engineering
  • Security Operations
  • Software Development Security

Asset Security

Companies must protect their assets. Just as locks go on the doors to protect physical assets, electronic and data assets must also be guarded. Asset security involves the full support of everyone in an organization, from corporate-level personnel down to front line employees. Various security controls will be described that help protect privacy, along with data leakage prevention (DLP). Although it is not necessary, having some foundation in IT concepts is helpful in taking this course.

The content in this course aligns with Domain Two in the CISSP exam, offered by (ISC)2. However, the course can be taken as a stand-alone without the intention of sitting for the exam.

  • Dates: Open enrollment
  • Duration: 90 days
  • Time: 5 hours
  • Location: Online
  • Course Fee: $79.00 USD
  • CEUs: 0.5 CEUs | 5 PDUs
    Total PMI PDUs/Contact Hours: 5
    Leadership: 1
    Strategic & Business Management: 1
    Technical: 3
    IACET CEUs: 0.5
  • Code: 01-PRO-TEC-ON

Register

Communication & Network Security

This course covers topics related to communications and network security. It begins with a lesson in the different types of networks and different transmission technologies. It also covers the two main models that govern how networks work: the OSI model and the TCP/IP model, as well as their related layers. The course includes a detailed discussion of the many protocols that allow networks and network devices to communicate with one another and includes a discussion of firewalls and wireless networks. This course is designed for IT professionals and other adult learners who are interested in gaining an introduction to information technology security.

The content in this course aligns with Domain Four in the CISSP exam, offered by (ISC)2. However, the course can be taken as a stand-alone without the intention of sitting for the exam.

  • Dates: Open enrollment
  • Duration: 90 days
  • Time: 5 hours
  • Location: Online
  • Course Fee: $79.00 USD
  • CEUs: 5 CEUs | 5 PDUs
    Total PMI PDUs/Contact Hours: 5
    Strategic & Business Management: 1
    Technical: 4
    IACET CEUs: .5
  • Code: 01-PRO-TEC-ON

Register

Identity and Access Management

This course introduces students to the principles of access controls, beginning with the central modes of information security and continuing through various attacks and defenses. The course presents different kinds of authentication techniques, how they work, and how they are distinguished from each other. This course requires some basic understanding of IT concepts.

The content in this course aligns with Domain Five in the CISSP exam, offered by (ISC)2. However, the course can be taken as a stand-alone without the intention of sitting for the exam.

  • Dates: Open enrollment
  • Duration: 90 days
  • Time: 5 hours
  • Location: Online
  • Course Fee: $79.00 USD
  • CEUs: .5 CEUs | 5 PDUs
    Total PMI PDUs/Contact Hours: 5
    Strategic & Business Management: 2
    Technical: 3
    IACET CEUs: .5
  • Code: 01-PRO-TEC-ON

Register

Security and Risk Management

This course covers the role of governance and risk management in information security. It looks at the policies and standards that are needed to operate an effective information security function and to oversee good information security practices. The course also includes a look at how modern organizations manage information security risks and how to conduct a risk analysis. It concludes by examining the process for providing information security training and education. This course requires some basic understanding of IT concepts.

The content in this course aligns with Domain One in the CISSP exam, offered by (ISC)2. However, the course can be taken as a stand-alone without the intention of sitting for the exam.

  • Dates: Open enrollment
  • Duration: 90 days
  • Time: 5 hours
  • Location: Online
  • Course Fee: $79.00 USD
  • CEUs: 5 CEUs | 5 PDUs
    Total PMI PDUs/Contact Hours: 5
    Leadership: 1
    Strategic & Business Management: 1.5
    Technical: 2.5
    IACET CEUs: .5
  • Code: 01-PRO-TEC-ON

Register

Security Assessment and Testing

This course covers security assessment and testing, focusing on potential disruptions that can affect organizations and how they can be addressed with assessments and plans. Students will have the opportunity to practice how to assess the impact of disasters that may arise as well as to develop their own versions of these plans. This course requires a basic understanding of IT concepts.

  • Dates: Open enrollment
  • Duration: 90 days
  • Time: 5 hours
  • Location: Online
  • Course Fee: $79.00 USD
  • CEUs: 5 CEUs | 5 PDUs
    Total PMI PDUs/Contact Hours: 5
    Leadership: 0.5
    Strategic & Business Management: 1.5
    Technical: 3
    IACET CEUs: .5
  • Code: 01-PRO-TEC-ON

Register

Security Engineering

This course contains an introduction to the key concepts of cryptography and security engineering. It examines the role of encryption in information security and considers common encryption methods. In addition, the course discusses ciphers, their substitutes, and how they work. Public key infrastructure and management is also covered. This course requires a basic understanding of IT concepts.

The content in this course aligns with Domain Three in the CISSP exam, offered by (ISC)2. However, the course can be taken as a stand-alone without the intention of sitting for the exam.

  • Dates: Open enrollment
  • Duration: 90 days
  • Time: 5 hours
  • Location: Online
  • Course Fee: $79.00 USD
  • CEUs: CEUs | 5 PDUs
    Total PMI PDUs/Contact Hours: 5
    Strategic & Business Management: 2
    Technical: 3
    IACET CEUs: .5
  • Code: 01-PRO-TEC-ON

Register

Security Operations

This course contains a detailed overview of security operations: administrative controls, trusted recovery and change and incident management. This course establishes a foundation in auditing, monitoring and detection in information security. This course requires a basic understanding of IT concepts.

The content in this course aligns with Domain Seven in the CISSP exam, offered by (ISC)2. However, the course can be taken as a stand-alone without the intention of sitting for the exam.

  • Dates: Open enrollment
  • Duration: 90 days
  • Time: 5 hours
  • Location: Online
  • Course Fee: $79.00 USD
  • CEUs: 5 CEUs | 5 PDUs
    Total PMI PDUs/Contact Hours: 5
    Leadership: 1
    Strategic & Business Management: 1.5
    Technical: 2.5
    IACET CEUs: .5
  • Code: 01-PRO-TEC-ON

Register

Software Development Security

This course contains a detailed overview of security operations: administrative controls, trusted recovery and change and incident management. This course establishes a foundation in auditing, monitoring and detection in information security. This course requires a basic understanding of IT concepts.

The content in this course aligns with Domain Seven in the CISSP exam, offered by (ISC)2. However, the course can be taken as a stand-alone without the intention of sitting for the exam.

  • Dates: Open enrollment
  • Duration: 90 days
  • Time: 5 hours
  • Location: Online
  • Course Fee: $79.00 USD
  • CEUs: .5 CEUs | 5 PDUs
    Total PMI PDUs/Contact Hours: 5
    Leadership: 1
    Strategic & Business Management: 1.5
    Technical: 2.5
    IACET CEUs: .5
  • Code: 01-PRO-TEC-ON

Register