Advanced Cybersecurity
Online Certificate Program

Learn About Our Programs

Step 1: Program
Step 2: Contact
By submitting this form, I agree that University of Arkansas Grantham may email, call and/or text me about education programs at the number provided including a wireless number, possibly utilizing automated dialing technology. Message and data rates may apply. Providing this consent is not required in order to enroll. If I live outside the U.S., I am giving consent to transfer my data to the U.S. I also agree to the terms in our privacy policy.

Enhance your Skills for Today’s High-Demand Field

The objective of the Advanced Cybersecurity program is to provide students with the knowledge and skills required of cybersecurity professionals. Going beyond Network+ and Security+, this certificate focuses on additional areas of knowledge associated with the CISSP certification, such as risk management and mitigation, access control and authorization methods, disaster recovery practices and standards, social engineering, cryptography and legal implications. Standard tools and virtual labs give students hands-on exposure to security scenarios.

Expect More from UA Grantham

More affordability: UA Grantham has one of the lowest tuition rates in the U.S.1

More start dates: Most courses in this program start monthly. It's easy to get started whenever you're ready.

More credibility: UA Grantham is accredited by the Distance Education Accreditation Commission (DEAC), which is listed by the U.S. Department of Education as a recognized accrediting agency and recognized by the Council for Higher Education Accreditation (CHEA).

Admission Requirements

In addition to proof of high school graduation or its equivalent, admission to the Advanced Cybersecurity certificate program requires at least one of the following:

    • Completion of the Cybersecurity Concepts certificate or equivalent or;
    • Current Network+ and Security+ certifications or equivalent

Program Outcomes

    • Assess and analyze threats to information systems
    • Evaluate the standards, processes, methods and tools used to mitigate risk
    • Analyze key attributes to various access control methods and authorization techniques
    • Compare and contrast various ciphers and encryption standards
    • Identify elements and processes for developing, testing and implementing business continuity plans
    • Examine methods for reducing security risks arising from the human element and organizational culture and structure
    • Identify legal and ethical issues surrounding global information systems security

Need More Help?

Talk to a dedicated admissions representative and get answers to all your Advanced Cybersecurity questions. Give us a call at 800-955-2527 or email us at

Get in Touch