Skip to Main Content

This site provides information using PDF, visit this link to download the Adobe Acrobat Reader DC software.

Chat with TESU

Graduate Certificate in Cybersecurity - Critical Infrastructure

The online Graduate Certificate in Cybersecurity – Critical Infrastructure was designed by top cybersecurity professionals working in the utility industries to prepare mid-career professionals with the skills and competencies required to secure critical major utility infrastructures, such as power grids and water purification systems.

How is this program unique?

  • It blends both information technology (IT) and operational technology (OT)
  • It focuses specifically on critical infrastructure sectors such as energy, water, gas and transportation
  • It is offered completely online and can be completed in less than a year

The 15-credit program is designed to help current utility employees advance professionally in the cybersecurity field and prepares IT professionals to transition into the utility industry.

According to the U.S. Bureau of Labor Statistics, employment of information system analysts is expected to grow by 18 percent through 2024.

Utilities have unique security requirements given their use of geographically distributed high performance networks, requirements for both safety and reliability and compliance standards. Building and maintaining secure utilities networks requires specialized knowledge and skills that include a comprehensive understanding of cybersecurity frameworks, a firm awareness of utility business practices and a thorough understanding of operational technologies. In this program, students will develop the knowledge and skills needed to secure critical infrastructure systems.

Learning Outcomes

Graduates of this program will be able to:

  1. Investigate cybersecurity risks based on ranking criteria.
  2. Apply appropriate models for security risk mitigation.
  3. Analyze new technology and identify/develop solution sets for cybersecurity vulnerability concerns.
  4. Construct research-based recommendations to resolve security incidents and to mitigate vulnerabilities and threats.
  5. Develop cybersecurity solution requirements for IT/OT vendors and suppliers.
  6. Implement industry best practices for existing and future systems.
  7. Implement security controls as defined by industry standards and cybersecurity frameworks.
  8. Integrate security into the entire system life cycle (planning, architecture, design, development, implementation/operation, maintenance and disposal).