Online Cybersecurity Certificate Courses
Curriculum Details
9 total credits required
The online Cybersecurity Certificate program prepares students with practical knowledge to work as effectively in the growing field of cybersecurity. The 3 required courses in this program will provide valuable skills from detecting data breaches to learning the theory behind cybersecurity.
All courses in this program are taught fully online and in an asynchronous format.
Core
Credits
This course is an advanced survey of modern topics of theory, foundations, and applications of modern cryptography. One-way functions, pseudo-randomness, encryption, authentication, public-key cryptosystems, and notions of security, are covered. The course also covers zero-knowledge proofs, multiparty cryptographic protocols, and practical applications.
This course focuses on the fundamentals of Blockchain Technology. It provides a conceptual insight into the role of Blockchains as a means for securing distributed systems, how consensus on their blocks is reached, and the new applications that they empower. It includes the technological foundations of blockchain functionalities such as distributed data structures and decision-making models, their operations, and various architectures. The course presents a brief discussion on current Smart Contract (SM) techniques and platforms, and studies their future directions, prospects, challenges, and risks. Students will learn how blockchain systems are constructed, how to interact with them, and how to design and implement secure distributed applications. Students apply the knowledge they gain by implementing a detailed blockchain system that includes transactions, blocks, cryptography, and a consensus mechanism using a popular programming language such as Java or Python.
This course covers theory and practice of network security. Topics include static packet filter, stateful firewall, proxy firewall, IDS, VPN Device, DMZs and screened subnets, networks defence components, internal network security, host hardening, configuration management, audit, human factors, and security policies. The course also covers cryptographic protocols, privacy, anonymity and various case studies.
Request More Information
Looking to learn more? Our expert team is ready to answer any questions you may have.
We can also communicate with you via WhatsApp and Whereby. Please let us know if you would like to be contacted this way in our initial communication with you and we will update your preferences.
All fields required