Getting Started

Contact Us

Information And
Communications
Technology

Information Systems Security (Certificate)

<object width="400" height="225"> <param name="allowfullscreen" value="true" /> <param name="allowscriptaccess" value="always" /> <param name="movie" value="http://vimeo.com/moogaloop.swf?clip_id=38449933&amp;server=vimeo.com&amp;show_title=1&amp;show_byline=0&amp;show_portrait=0&amp;color=00adef&amp;fullscreen=1&amp;autoplay=0&amp;loop=0" /> <embed src="http://vimeo.com/moogaloop.swf?clip_id=38449933&amp;server=vimeo.com&amp;show_title=1&amp;show_byline=0&amp;show_portrait=0&amp;color=00adef&amp;fullscreen=1&amp;autoplay=0&amp;loop=0" type="application/x-shockwave-flash" allowfullscreen="true" allowscriptaccess="always" width="400" height="225"> </embed> </object>
  • Play
  • Play
  • Play
  • Play
  • Play
  • Play
  • Play
  • Play
  • Play
  • Play
  • Play
  • Play
  • Play
  • Play
  • Play
  • Play
  • Play
  • Play

Learn to navigate real-world cyber security challenges in this certificate program, such as setting up a secure network, securing servers, defining application security requirements, and solving hypothetical security breaches. Develop specific technical knowledge and skills and learn to place cyber security solutions within an overall enterprise context.

You’ll learn how to:


  • Develop and implement information security policies and procedures

  • Design secure network solutions and applications

  • Create strategies to establish secure operations

  • Plan for business continuity

  • Evaluate encryption standards and solutions

  • Conduct computer forensics analysis


The certificate curriculum aligns with the Common Body of Knowledge for CISSP certification developed by the International Information Systems Security Certifications Consortium (ISC)². In addition, the certificate was developed in collaboration with the Colorado Springs and Denver chapters of the Information Security Systems Association (ISSA), and the courses have been mapped to the Committee on National Security Systems (CNSS) standards. The University of Denver has been designated by NSA/DHS as a National Center of Academic Excellence in Information Assurance/Cyber Defense Education.

Credits earned through this graduate certificate may apply toward a master's degree in Information and Communications Technology.

For more information about our graduation rates, the median debt of students who have completed the program, and other important information, please visit our website at http://www.du.edu/learn/certificates/disclosure/ict.html


Required Courses

The graduate Certificate of Advanced Study in Information Systems Security requires completion of 24 credit hours (6 courses).

Concentration courses - 16 qtr. hrs (Choose 4)

Concentration courses allow students to focus on a specific professional area within the larger industry sector in which they are working or wish to work, and master the skills needed to excel in that area.


Elective courses - 8 qtr. hrs (Choose 2)

Electives may be chosen from among all courses in Information And Communications Technology programs. You may also select courses from other University College graduate programs with approval from the academic director.

After you submit your academic plan, your academic advisor will help you select electives that align with your career and personal goals, and your advisor will obtain any necessary approvals from the academic director.

Popular electives for students pursuing Information And Communications Technology programs include:

Additional Elective courses available, please Design your custom plan for elective courses


Design Your Custom Plan

Start Customizing Your Certificate


View the tutorial or start building your plan now.

Design Your Custom Plan!

Careers in Information Systems Security Certificate

Titles
Information System Security Officer (ISSO), Security Officer, Information Technology Specialist, Security Analyst, IT Manager, Information Assurance Officer, Strategist, Security Technology Architect.

Duties
Develop and maintain system security plans, management, training, policy interpretation, architecture, security testing, decision-making, policymaking.

Outlook
The demand for information security specialists continues to expand as both public and private sector employers add positions, compounding the existing shortage of IT security professionals. According to intelligencecareers.com, former federal officials have estimated there are only 1,000 US security specialists with the interdisciplinary skills needed to fill 10,000 to 30,000 cyberspace and IT security positions. The top information systems security jobs in demand include computer forensics, wireless security, identity management, VoIP security, and disaster recovery.

Careers In Information and Communications Technology

YOU are in high demand!
One of the fastest growth rates among all occupations in the US, computer scientist and database administrator job openings are expected to grow 53% in the next ten years, according to the Bureau of Labor Statistics. Overall, the ICT career outlook is incredibly positive, with a 28% employment increase expected within the field. Whether you choose a career at a government agency, large corporation, or small organization, ICT professionals are in high demand—particularly if you have job experience and relevant education in information and communication technology under your belt.

ICT makes the grade.
The best jobs are in IT, according to U.S. News and World Report. From Information Technology Manager to Database Administrator, Software Developer to Web Developer, these jobs crack the top 10 careers on the U.S. News and World Report list of top 100 best jobs, as there is an explosive demand in the IT field. A master's degree is preferred for most positions, according to U.S. News and World Report, which also predicts that a focus on mobile application development will help professionals beat the competition.

Where are they now?
Alumni from University College who graduated with a master's degree in information and communication technology hold job titles such as Systems Administrator, Project Manager, Network Engineer, Managing Consultant, Network Architect, Lead IT Analyst, Data Engineer, and CEO in companies and organizations such as Pratt & Whitney, Ironware Technologies, iBoss Security, PayPal, Parsons Brinkerhoff, Vanguard Communication, CenturyLink, Advanced Program Group, Level 3, Verizon Wireless, IBM, IntelliDyne, Cisco Systems, Chevron, Time Warner, Harland Financial Solutions, and the United States Air Force.

Ready to Apply

It's time to gather your materials and apply to your program of choice. Remember to include:


How to Apply


Need More Information

Interested in attending University College, but need additional information before you make a decision? No problem−we're here to help. You may request additional information about a specific program and specialty, review and ask questions in our Frequently Asked Questions section, or contact University College directly.

Want to Take a Class

Even if you missed the application deadline, you can start taking courses for one quarter before you have to submit a completed application. We know how important it is to get started when you're ready, so review the class schedule or start the registration process now.

bachelor's of arts completion student experience video

Student Experience

From start to finish, the Bachelor of Arts Completion Program provides an unparalleled experience that helps you do more for your career, family, and community.

university of denver university college online course

See How Our Online Course Works

Online classes are designed and delivered for busy adults seeking a convenient option to pursue education.

university of denver, university college non-credit

Lifelong Learning

Non-credit classes offer diverse, interesting topics from politics to the arts, nature to technology. Stimulate your mind and reawaken your curiosity−all for the love of learning!