Skip to main content

woman in data analytics

Cybersecurity Graduate Certificate

The Fastest Growing Sector in Security is Cybersecurity

Protecting an organization from cyber threats is a challenge that continues to broaden in scope and complexity, as dependence on computing systems for business and other areas of life increases. Internet of Things, a larger and faster cellular network, and the growing need for mobile computing and constant connectivity, have all contributed to an increase in the average attack surface.

The courses offered in the Cybersecurity Graduate Certificate at UHD target specific skillsets that are in high demand in the industry. These areas of study expose the students to both conceptual and operational realities through experiential learning and real-world considerations. Instructors use a risk-based approach and decision modelling techniques to reinforce both preemptive and reactive security event management principles. The graduate certificate in Cybersecurity can be taken as a separate program of study or as part of the Master in Security Management at the Marilyn Davis College of Business.

Graduate Certificate Courses may have additional charges of up to $168 per SCH. For more information, see the graduate program's tuition and fees

Cybersecurity Courses

The Cybersecurity Certificate requires 6 courses (18 credits) from the list below.

This course provides first-hand, practical experience in one or more foreign countries. Students will learn about economic, cultural, social, and political structures that influence managerial practices and relationships. Students will apply what they have learned in other graduate-level courses from their program of study in a project connected with a global or non-USA-based organization or industry. This course requires the student to participate in a Marilyn Davies College of Business-sponsored study tour of a selected foreign country/region.
This course provides first-hand, practical experience in one or more foreign countries. Students will learn about economic, cultural, social, and political structures that influence managerial practices and relationships. Students will apply what they have learned in other graduate-level courses from their program of study in a project connected with a global or non-USA-based organization or industry. This course requires the student to participate in a Marilyn Davies College of Business-sponsored study tour of a selected foreign country/region.

Survey of the field of human resources management with emphasis on security management. Topics include human resources planning, recruiting and selection, performance appraisal, compensation and reward systems, training and development, and employee relations. Regulatory and legal aspects of human resources management will be integrated throughout the course.

Students will learn how sound governance, ethical principles, and compliance with regulatory standards guide the development and implementation of policies, procedures, and programs to address threats to an organization’s security.

Students will learn the fundamentals of ICS Cybersecurity and how Operational Technology (OT) Cybersecurity differs from Information Technology (IT) Cybersecurity. Students will also explore the regulatory frameworks and standards used in securing Industrial Control Systems from cyber threats.

This course focuses on the foundations of a risk based cyber security program. Students will focus on applying threat, vulnerability and risk analysis in order to manage an organization’s IT security program.

This course focuses on treating an organization’s data as an asset that must be protected, ways to protect that data as an asset and the impact of data breach and/or theft of that data.

This course focuses on the security risks related to an organization’s enterprise network connections to the external web and implementing technology to mitigate the identified security risks.

This course examines the role of business continuity as part of a comprehensive, threat based, risk management strategy by looking at standards, strategies, crisis management, employee orientation, plan development and testing.


The Master of Security Management degree with Cybersecurity Certificate requires satisfactory completion of 36 credit hours offered by the Marilyn Davies College of Business. This includes 18 credits above and 18 from Core Courses below:

This course merges communication theory and pragmatic application with modern crises, issues management, and real-world experiences. All inquiry-based activities lead to important learning through independent and collaborative work, research, investigations, discussions, and presentations.

Leadership, motivation, and communication for executives in security organizations. Topics include one’s own managerial and leadership skills, interpersonal skills, and leading organizational change.

The management of the security function is examined through the study of management strategies and case studies. Discussions and research will include policies and procedures, fiscal management, audits and surveys and organizational structures and operations and crisis management.

This course surveys a variety of procedures, programs and policies used to form a strategic business security plan to neutralize an organization’s vulnerabilities and measure the effectiveness of its security. Strategies to prevent and reduce risks inherent in the private business sector will be discussed and analyzed.

Criminal law, administrative law and extralegal contractual agreements that impact security management including legal liabilities attached to arrest, search and seizure, evidence, tort liability and personnel issues in industrial, corporate, retail and private security.

This course will assess the current and changing landscape of cybercrime and expose students to advanced concepts in computer forensic analysis, as part of a response to the investigation of an incident. The methods of collection, preservation, analysis and presentation of digital evidence will be presented to properly conduct a computer forensics investigation.



Loading...