Certificate in Cybersecurity

Villanova University

How long?

  • online
  • on demand

Villanova University

Disclaimer

Coursalytics is an independent platform to find, compare, and book executive courses. Coursalytics is not endorsed by, sponsored by, or otherwise affiliated with any business school or university.

Full disclaimer.

Read more about Cybersecurity

The modern world of security systems is changing rapidly, and these days cybersecurity has become one of the most essential parts of protecting data s...

Read more about Information Technology

Information technology is at the heart of any process connected to utilizing computers and communication systems. It is a quite broad term that is use...

Read more about Project management

Whether it is developing software programs or launching a new clothing line, taking any project from start to finish requires the application of proje...

Reviews

Comprehensive course analysis

Unbiased reviews from past participants
Global companies alumni of this course worked for
Positions of participants who took this course
Countries where most past participants are from
FREE
Individual needs analysis

Who should attend

This cybersecurity program is ideal for business professionals who must combat potential cyber-threats and attacks that endanger their organizations' data.

About the course

Hackers and cyberterrorists have pushed corporations to new levels of alert, creating the need for heightened IT security measures to protect both infrastructure and data.

Villanova University’s 100% online Certificate in Cybersecurity provides students with foundational knowledge of cybersecurity terminology, cloud computing best practices, the management and identity of network access, and infrastructure, operational and transmission security. In addition, the curriculum can help prepare you for the CompTIA Security+ certification exam, while providing you with valuable insight into the latest information security techniques and technology used by industry experts.

The Certificate in Cybersecurity can be earned by completing two required courses and one elective. This certificate focuses on the entry-level IT security certification of professionals with networking and security experience.

What You’ll Learn

Learn proven techniques for assessing security risks and safeguarding corporate data including the theorical and applied aspects of IS and IT security. Earn the qualifications to meet government requirements, advance your career potential or transition into a qualified information security role.

Required Courses

Essentials of Cybersecurity

As a cybersecurity professional, you know that hackers and cyberterrorists have pushed corporations to new levels of alert these days, creating the need for heightened security to protect both infrastructure and data.

And undoubtedly, you also know that increasing your understanding of risk assessments and current cyber trends is an ongoing process. It’s essential to maintain skills to combat threats, prevent attacks, and perform remediation activities.

What You’ll Study

Upon completion of this course, you will be able to:

  • Describe security and the investigation phase.
  • Identify threats, attacks, and current issues in cybersecurity.
  • Compare information security policies, standards, and procedures.
  • Define firewalls, intrusion detection systems, cryptography, and encryption.
  • Discuss logical physical security designs.
  • Explain the role of risk management, identification, and mitigation selection in cybersecurity.
  • Describe the implementation and maintenance of security.

Curriculum

Introduction to Security and Security Investigation Phase

  • Identify the reasons for investigating your organization’s vulnerabilities and securities
  • Describe IS history and the need for security
  • Describe the Systems Development Life Cycle (SDLC)
  • Identify the differences between threats and attacks
  • Discuss security ethics

Introduction to Security and Security Investigation Phase, continued

  • Identify the reasons for investigating your organization’s vulnerabilities and securities
  • Describe IS history and the need for security
  • Describe the Systems Development Life Cycle (SDLC)
  • Identify the differences between threats and attacks
  • Discuss security ethics

Security Analysis

  • Explain the process of analyzing a security system project
  • Describe risk identification and assessment
  • Define risk management, control, and mitigation

Security Analysis, continued

  • Explain the process of analyzing a security system project
  • Describe risk identification and assessment
  • Define risk management, control, and mitigation

Logical and Physical Security Design

  • Describe the process of designing a security system
  • Explain IS security policies and procedures
  • Discuss IS security design models and physical security
  • Define cryptography, encryption, antivirus, and spam
  • Summarize incident response and disaster recovery

Logical and Physical Security Design, continued

  • Describe the process of designing a security system
  • Explain IS security policies and procedures
  • Discuss IS security design models and physical security
  • Define cryptography, encryption, antivirus, and spam
  • Summarize incident response and disaster recovery

Implementation and Maintenance of Security

  • Discuss industry standard processes and procedures used to implement and maintain a security system
  • Detail project management techniques specific to IS security
  • Describe implementation issues
  • Explain organizational security functions and considerations

Implementation and Maintenance of Security, continued

  • Discuss industry standard processes and procedures used to implement and maintain a security system
  • Detail project management techniques specific to IS security
  • Describe implementation issues
  • Explain organizational security functions and considerations

Mastering Cybersecurity/Security+

Policies and technologies need dedicated people who can implement and manage them. Become part of a well-trained workforce that effectively combats hackers, fights attacks and battles other threats.

This in-depth course builds on Essentials of Cybersecurity to expand your knowledge in the cybersecurity field. Topics include communication security, infrastructure security, cloud computing, cryptography, access control, authentication, external attacks, operational and organization security.

What You’ll Study

At the conclusion of this course, you should be able to:

  • Identify assets, vulnerabilities, and threats, and assess risk mitigation strategies
  • Name and describe security policies that facilitate compliance
  • Describe how protocol analyzers and IDS/IPS applications monitor and protect network activity
  • List and explain three types of access control and six authentication mechanisms
  • Identify threats to wireless communications and cloud security
  • Evaluate various types of firewalls and other network security tools
  • Explain the goals, processes, and core elements of cryptography
  • Describe the attack methodologies for Trojans, backdoors, botnets, and DDoS, and specify ways to mitigate these threats
  • Outline the basic steps involved in incident response and disaster recovery

Curriculum

Introduction to Mastering Cybersecurity/Security+™, Part 1

  • List and explain three types of access control and six authentication mechanisms
  • Identify assets, vulnerabilities, and threats and assess risk mitigation strategies
  • Determine specific risks associated with cloud computing and virtualization
  • Name and describe security policies that facilitate compliance
  • Summarize five basic network classifications and their standard building blocks
  • Diagram the OSI model layers and the TCP/IP stack components

Introduction to Mastering Cybersecurity/Security+™, Part 2

  • Evaluate various types of firewalls and other network security tools
  • Explain how RADIUS, TACACS+ and DIAMETER provide access control
  • Recommend methods for securing SMTP, IMAP, POP and wireless networks
  • Identify threats to email and wireless communications
  • Describe how protocol analyzers and IDS/IPS applications monitor and protect network activity
  • Outline the basic steps involved in incident response and forensic analysis

Security in Transmissions, Part 1

  • Classify the different types of IP addresses and address-translation strategies
  • Identify common wireless security tools and relate how 802.11 networks operate
  • Explain the role of Snort and honeypots in network intrusion detection (NID)
  • Summarize the best practices for handling digital evidence
  • Describe the attack methodologies for Trojans, backdoors, botnets, and DDoS and specify ways to mitigate these threats

Security in Transmissions, Part 2

  • Specify the basic strategies behind the triad of attacks
  • Categorize the three primary types of password authentication
  • Identify various types of malware and social engineering techniques
  • State the full name and responsibilities of organizations more commonly known by their acronyms
  • Recommend ways to enhance password-based authentication

Security in the Infrastructure, Part 1

  • Explain how the Kerberos authentication process operates
  • Identify and compare several major access control models
  • Diagram the layers of defense and specify the different types of access control for each layer
  • Cite the security concerns associated with social networking and peer-to-peer networking
  • Define attack terminology and outline the system hacking life cycle
  • Describe the processes involved in hardening an operating system and hardening applications

Security in the Infrastructure, Part 2

  • Identify application vulnerabilities and strategies to overcome them
  • List key steps to enhancing the security of the software development life cycle
  • Explain the goals, processes, and core elements of cryptography and steganography
  • Define common hashing algorithms and advanced cryptographic concepts
  • Describe how users gain remote network access via telnet, SSH, and VPNs
  • Outline the basic IPsec configurations and email encryption protocols

Operational Security, Part 1

  • Identify and contrast the three basic types of identity proofing
  • Define PKI and explain its use of digital certificates, digital signatures, and key management
  • Specify common web server and browser vulnerabilities and propose countermeasures to address them
  • Outline the components and functions of the major web protocols: HTTP, SSL/TLS, HTTPS, and LDAP
  • Describe the purpose of controls, and differentiate between operational, technical, and physical controls

Operational Security, Part 2

  • Describe the various tools and measures that can be implemented to harden a network
  • List the different types of specialized network devices and explain how they are used
  • Identify wireless vulnerabilities and implement strategies to combat them
  • Compare the channels used by IEEE 802.11 for wireless networking
  • Outline the steps involved in redundancy planning, disaster recovery, and change management
  • Compare and evaluate the different kinds of logical access controls

ic steps involved in incident response and forensic analysis

1 Elective

Essentials of Business Analysis 8 Week Course

Essentials of Business Intelligence 8 Week Course

Essentials of Business Process Management 8 Week Course

Essentials of Project Management 4 Week Course

Foundations of Agile Methodology 8 Week Course

Maximizing Team Effectiveness 8 Week Course

Certificate in Cybersecurity at Villanova University

From  $6,235
Add coaching to your course booking

Coaching can personalize and deepen learning for you and your organization.


Something went wrong. We're trying to fix this error.

Thank you for your application

We will contact the provider to ensure that seats are available and, if there is an admissions process, that you satisfy any requirements or prerequisites.

We may ask you for additional information.

To finalize your enrollment we will be in touch shortly.

Disclaimer

Coursalytics is an independent platform to find, compare, and book executive courses. Coursalytics is not endorsed by, sponsored by, or otherwise affiliated with any business school or university.

Full disclaimer.

Read more about Cybersecurity

Сybersecurity courses offer an excellent opportunity to develop the knowledge and skills necessary to implement a perfect cybersecurity strategy that will accelerate the main security protocols' efficiency. After the successful completion of cybersec...

Read more about Information Technology

A large part of the courses provides basic information so the students are not required to have any IT qualifications before enrolling. Most of the IT learning programs are also broken down into specific areas of interest, such as systems analysis, a...

Read more about Project management

Whatever the reason you are considering taking a project management course, there are certain criteria to look for in a course. Undoubtedly, it should meet your needs. If you are a newcomer to the field, a course should provide a complete theoretical...

Because of COVID-19, many providers are cancelling or postponing in-person programs or providing online participation options.

We are happy to help you find a suitable online alternative.