The six courses in the program are: Computer Security Management, Computer Security Principles, Telecommunications and Network Security, Establishing and Managing Information Assurance, Security Laws and Standards, IT Disaster Recovery Planning.

The first two courses are described below. Subsequent courses will be introduced in the coming months.

Course 1: Computer Security Management

Computer Security Management is the first course in the Cyber-Security Certificate Program, designed to enable managers, technical division heads and newcomers to exercise leadership in the information protection and cyber-security field. The program is intent upon meeting industry’s need for well-trained individuals to manage initiatives in all areas relevant to effective information security competency, stewardship and governance. Students may take this course as a stand-alone or as part of the above-mentioned certificate program. In broad strokes, the course surveys good management processes as they apply to business activities and information assets, highlighting fundamental concepts related to various aspects of information security - planning, policies, and programs. The various modules zoom in on how essential information security procedures apply to strategic organizational planning processes as well as how to anticipate unexpected events that impact business operations. The course also explains security functions within an organization, examining security management best-practices and models. Throughout the course, students are introduced to risk management and control strategies along with various types of protection mechanisms. Specific topics include: security management, risk management, access control, security architecture, security protection, personnel, ethics, and legislation. Make no mistake about it; in this day and age, cyber-security issues are a necessary and critical management responsibility, and thus must remain in the cross-hairs of any forward-thinking manager, not just high-tech specialists.

Computer Security Principles covers the essentials of computer security that every professional working in the field must know. The course covers topics associated with the (ISC) 2 SSCP certification exam, which focuses on best practices, roles, and responsibilities of security experts. After completing this course, students should be able to move to a more technical level of preparation as required for the CompTIA Security+ Certification exam.

Security knowledge is essential both now and in the future. Accordingly, the course focuses on what a manager needs to know in order to be comfortable with technical issues. Ironically enough, however, technical knowledge alone is not sufficient to perform well in this highly technical field. Other courses in the certificate program are required for non-technical personnel to be able to manage critical security issues.

Course 2: Computer Security Principles

The Computer Security Principles course highlights fundamental security topics such as cryptography, protocols, passwords, access control, software security, and network security. Additional topics are selected from multilevel security, biometrics, tamper-resistant hardware, information warfare, e-commerce, system evaluation and assurance, and intrusion detection. Along the way, participants should expect a review of:

Finally, students in the course will learn to think like the 'bad guy', knowing when to break rules in the process but making sure to refrain from anything illegal. In short, the security professional is always on the lookout for weaknesses, racing to uncover them before the wrong people do.

  • General security concepts, vulnerabilities and exposures, incidents

  • Cryptography

  • How to secure data with symmetric encryption

  • How to solve key distribution issues with asymmetric encryption

  • How to ensure integrity with hashes

  • Key Management and Public Key Infrastructure

  • Network Security

After completing this course, participants should be able to:
  • Explain the terminology and issues related to computing security, vulnerabilities and exposures, and risk assessment.

  • Discuss basic technical aspects of computer security: cryptography, public key infrastructure, and security standards and protocols.

  • Identify practical aspects of computer security as well as understand the implementation of security aspects in remote access, including e-mail, web components, and software engineering

  • Be prepared to earn CompTIA A+ Certification (especially relevant for those students who wish to advance from a managerial to a more technical perspective). Keep in mind that the CompTIA A+ Certification is the industry standard for computer support technicians. This international, vendor-neutral certification helps to demonstrate competency in areas such as installation, preventative maintenance, networking, security, and troubleshooting. CompTIA A+ certified technicians also possess excellent customer service and communication skills, important for working with clients.

  • Be prepared to earn CompTIA Security+ Certification, an international, vendor-neutral certification that demonstrates competency in areas such as network security, compliance and operational security, threats and vulnerabilities, access control and identity management, and cryptography.