Cyber security is more important than ever, with government and private sector networks being exploited at an unprecedented scale. As these threats grow, the cyber workforce needs to understand and protect the critical components upon which the economy, government, and national security are built.
The Cyber Security certificate program provides students with a foundational knowledge of vital cyber aspects, including operations, laws, and policies. All classes are taught by practicing professionals who have prestigious certifications, subject expertise, and a wealth of real-world experience, ensuring you’ll learn important, hands-on lessons. This program is delivered remotely via Zoom.
SWENG 5180: Cyber Risk Management
This 7-week course provides students with foundation in Cyber Risk Management, aligned with the National Institute of Standards and Technology (NIST) RMF 800-37R2, and uses NIST SP800-53A, the assessment of security and privacy controls in information systems and organizations.
Students will learn the skills need to perform regular risk assessments, define Risk, Risk scoring and identify gaps.
- Assign NIST security controls and countermeasures
- Use of Risk Assessment Tools
- Develop a NIST Risk Management Framework
- Identify KPIs and KRIs for Risk Management
- Integrate Risk Management Strategy into Business Functions
Students will conduct a Cyber Risk Management exercise on a fictional company, with the culmination of applying to either their company, or a fictional company on their own, followed by a peer review.
- Perform a complete risk assessment.
- Inventory companies most critical information assets.
- Assign a data owner and custodian to an information asset.
- Assign classification values to critical information assets.
- Prioritize risk remediation efforts as a result of performing a risk assessment.
- Evaluate risk management models for use in their own organization.
SWENG 5179: Foundations of Cyber Operations
The United States may be facing the most serious economic and national security challenge of the 21st century; our government and private sector networks and information are being exploited via cyber operations activities at an unprecedented scale by a growing array of state and non-state actors. The evolution of increasingly complex network structures creates critical interdependencies that lead to expanded cyber operations opportunities and increased vulnerabilities. Therefore, we must train our cyber work force so that they may take action to protect the critical components upon which our economy, government and national security are based by an adversary that utilizes a wide array of network exploitation, disruption or destruction techniques. In order to appropriately defend these complexities and interdependencies in a cyber environment, students must become familiar with foundational network security methods and concepts, and protocols, Cybersecurity principles, and knowledge of cyber threats and vulnerabilities.
In this 7-week course, students from all educational disciplines and professional backgrounds will have hands-on experience using PSU Weblabs to learn fundamental concepts designed to help familiarize them with the potential cyber operations that they may encounter on a daily basis.
- To better understand Network Security and Technical Concepts
- Application, Data and Host Security
- Malware Analysis
- Identification, Authentication, and Authorization in Modern Operating Systems
SWENG 5178: Principles of Cyber Law & Policy
Cyber activities and cyber operations are subject to a diverse array of U.S. federal laws, state laws, constitutional law, and regulatory policies, as well as international laws that together comprise a framework of law called Cyberlaw. Individuals, businesses, and governments involved in any aspect of cyber operations (“cyber actors”) must have a clear understanding of cyber technology platforms (cyberspace) and the legal and policy background (cyberlaw) to ensure that cyber activities and operations (“cyber actions”) are conducted within, but not beyond, the maximum limits of legal authority.
In this 7-week course, students again will work hands-on with PSU Weblabs to learn fundamental and mid-range concepts designed to help ensure that the cyber operations in which they participate are consistent with the laws and values of the society they serve.
- Overview of Cyberspace and the Intersection of Law & Policy
- Cyber Governance in the U.S.
- Legal Foundations of Cyber Law & Policy
- The Cyber Threat-Response Network
SWENG 5172: Certified Information Systems Security Professional (CISSP) Exam Preparation*
*Optional fourth course
|Certified Information Systems Security Professional (CISSP) Exam Preparation
|Online via Zoom
|Thursdays, March 14 - May 16, 2024
6:00 pm - 9:00 pm
|$1,795 ($500 discount if taken as fourth course in cyber security certificate program)
|Registration Coming Soon
Certified Information Systems Security Professional (CISSP) Exam Preparation course will expose students to the eight domains of knowledge required to pass the exam:
- Security and Risk Management
- Asset Security
- Security Engineering
- Communications and Network Security
- Identity and Access Management
- Security Assessment and Training
- Security Operations
- Software Development Security
Because the course is 10 weeks long, each session will provide an overview of a domain.
The course is taught by a CISSP-certified professional who is eligible to sponsor students for their CISSP certification once they have completed and passed the exam.
The official CISSP exam is not included with the course and must be scheduled directly through Pearson Vue. The class is taught by a practicing professional who has prestigious certifications, subject expertise, and a wealth of real-world experience, ensuring you’ll learn important, hands-on lessons.
Course Scope and Sequence
This 30-hour course consists of face-to-face lecture, classroom discussion, and practice exams. At the end of the course, the instructor will review with students how to schedule the CISSP exam and provide links to practice tests to prepare.
It is required that students have a minimum of 5 years of paid, full-time work experience in two knowledge domains to qualify for the CISSP certification.
For more information on the CISSP certification process, visit the (ISC)2 website. There are other options for students without the required work experience.
Who Should Attend
This course is open to information security professionals with five years of work experience in two out of the eight knowledge domains and who are eligible to sit for the CISSP exam.
Every week will provide an overview of each knowledge domain. If students are not familiar with a specific topic, they will be provided with resources to study the area independently. The course will provide students with a solid understanding of each topic, but the CISSP exam tests the ability to apply knowledge in different situations.
Continuing Education Units
Continuing Education Units (CEUs) are awarded based on a standard of one unit per ten (10) hours of classroom contact.
Note: The University reserves the right to cancel courses due to insufficient enrollment or other unforeseen circumstances.