Cybersecurity Concepts (Certificate)
The Entry Door Into One of Today’s Most In-Demand Fields
Our online Cybersecurity Concepts certificate program is an ideal starting point for students seeking to develop foundational knowledge in the field of cybersecurity.
Students will be introduced to the various aspects of information systems, including the principles, practices, policies, and standards for securing them, as well as the various threats and vulnerabilities they face. Networks, at the heart of information systems, are addressed through standard models and protocols, and students will learn how to configure and secure computer networks through hands-on simulations and virtual labs.
Through the knowledge gained in this program, as well as practice exams, students are prepared to sit for the CompTIA Network+ and Security+ certification exams.
This program is also relevant to students currently serving in entry-level technology roles including IT analyst, systems technicians, compliance specialist, and security auditor.
After earning the certificate, graduates are encouraged to continue developing their knowledge and skills by enrolling into the Advanced Cybersecurity certificate program [make a link]. Academic credit earned through completion of courses in these cybersecurity certificate programs can be applied to the bachelor's degree programs in cybersecurity.
Expect More from UA Grantham
More transferability: Students can transfer up to 6 applicable credit hours for this degree, which could reduce your time needed to complete this course.More affordability: UA Grantham has one of the lowest tuition rates in the U.S.1
More start dates: Most courses in this program start monthly. It's easy to get started whenever you're ready.
More credibility: UA Grantham is accredited by the Distance Education Accreditation Commission (DEAC), which is listed by the U.S. Department of Education as a recognized accrediting agency and recognized by the Council for Higher Education Accreditation (CHEA)
Program Outcomes
- Identify the layers of the OSI model
- Explain common networking protocols
- Set up and troubleshoot various network topologies
- Categorize threats and vulnerabilities to a network or information system
- Explain and apply different strategies for securing networks or information systems
- Determine the components and strategies for the implementation of an information systems security plan
- Identify relevant laws and standards applicable to information systems security and computer crime
Need More Help?
Talk to a dedicated admissions representative and get answers to all your Cybersecurity Concepts questions. Give us a call at 800-955-2527 or email us at admissions@uagrantham.edu.