CLICK TO CALL US »(800) 920-6723


Fill out the form below and we'll contact you and answer all of your questions.

* Required Fields

By submitting this form I agree that I can be contacted using the email or phone number that I provided.


Graduate Certificate inCYBER SECURITY

In this Section

Share this Page

Recognize and protect against cyber threats and cybercrime while securing sensitive information.

Download the Program Sheet
Download the Program Sheet

The Graduate Certificate in Cyber Security* from CSU-Global is a stand-alone, transcribable, nationally recognized certificate. This accelerated program is designed for people who believe that organizations and individuals have a right to keep their digital information secure in today’s global infrastructure.

With this certificate, you can become the digital protection people and businesses seek out to keep their sensitive information out of the wrong hands. Within the program you’ll gain the advanced knowledge and skills you need to secure data and protect assets.

* This certificate is eligible for Title IV financial aid.


Gain insights into the dynamic needs of the technology industry and employment trends.
Read More »

CISSP Certification

Coursework in the Graduate Certificate in Cyber Security aligns with 7 of the 8 Certified Information Systems Security Professional (CISSP) domains.

That means you’ll have the knowledge you need to obtain your CISSP certification with minimal test preparation. Our courses set you up for career success so you’re always able to evolve and add new skills in this constantly changing profession.

What is CISSP certification?

CISSP certification is the ideal credential for people with technical and managerial competence, skills, experience, and credibility to design, engineer, implement, and manage an overall information security program that protects organizations from sophisticated attacks.

CISSP certification was the first credential in the field of information security to meet stringent professional standards. CISSP certification is an objective measure of excellence and a globally recognized standard of achievement.

Should you earn CISSP certification?

CISSP certification can advance the careers of people working in the following positions and related roles:

  • Security consultant
  • Security manager
  • IT director/manager
  • Security auditor
  • Security architect
  • Security analyst
  • Security systems engineer
  • Chief information security officer
  • Director of security
  • Network architect

+ Learn more about obtaining your CISSP certification

Career Outlook

Our Graduate Certificate in Cyber Security prepares students to enter the large, lucrative, and rapidly growing field in a variety of job titles. Possible careers in cyber security include:

  • Information security analyst - develop and implement cyber security measures to protect computer system networks.
  • Network architect - design and build local area networks (L ANs), wide area networks (WANs), and intranets.
  • Computer support specialist - provide service and assistance to network users and equipment.
  • Database administrator - store, organize, and secure sensitive data using specialized software.
  • Web developer - build and publish optimized websites, improving their performance, security, and capacity.

Regardless of the specific role that you enter, as a cyber security certificate holder, you’re in one of the fastest-growing fields through 2024. Not only will you be able to find a variety of careers that fit your skills set, you’ll also be able to move up quickly as you build on your Graduate Certificate of Cyber Security.

The average annual income for cyber security professionals is $90,120 or almost $45 per hour according to the Bureau of Labor Statistics. With the importance of cyber security in our technology-dependent world, you’ll always be in demand.


Program Description

The Graduate Certificate in Cyber Security provides advanced knowledge for the practical application of security data and protecting digital assets.

IT professionals will learn to mitigate malicious cyber activities through the implementation of security solutions within local and enterprise infrastructures by focusing on topics such as...

  • Security management.
  • Risk and vulnerability controls.
  • Data encryption.
  • Cybercrime combat.
  • Potential threat recognition.

Learning Outcomes

  • Evaluate internal and external threats and vulnerabilities to data assets in the enterprise and provide recommendations to mitigate or eliminate areas of weakness.
  • Compare and contrast the concepts of security and privacy and explain how the imperatives for each may complement or interfere with with the imperative for the other.
  • Describe and analyze the implications of major emerging technology trends, issues, and threats to the security and privacy of networks and information.
  • Analyze possible threats to organizational data and recommend course(s) of action to mitigate cybercrime attacks.
  • Analyze a network for vulnerabilities to common cyber‐based attacks.


  • ISM527: Cyber Security Management

    This course provides insight into the complex implementation and management of cyber security practices. Students perform risk assessments and recommend mitigations to protect digital assets in the workplace as well as discuss disaster recovery, incident handling, cyber security policy implementation, privacy, and legal issues related to cyber security.

  • ISM529: Emerging Cyber Security Technology, Threats, and Defense

    This course provides students with the opportunity to explore and examine emerging trends and technology in cyber security. Students analyze organizations and review the feasibility of adopting new cyber security trends in order to provide competitive advantages in the workplace. This course also evaluates necessary policy and procedure changes within the context of the continued evolution of technology.

  • ISM530: Enterprise Cyber Security

    This course provides students with insight into the cyber security issues surrounding an enterprise including securing organizational data, responding to cyber based security breaches, emerging technologies, and ensuring a secured computing environment for safeguarding company information.

  • ISM531: Cyber Security Defense and Countermeasures

    The Cyber Security Defense and Countermeasures course prepares students to defend enterprise networks from web based and internal attacks using techniques such as system hardening, encryption, policy enforcement and software/ hardware intrusion detection systems to protect enterprise data assets.

Cost and Schedule


We understand the sacrifice needed to invest in your education. Our promise to you is an affordable, high quality education with low tuition rates, no out-of-state premiums or student fees. Best of all, the CSU-Global Tuition Guarantee ensures that your tuition rates will not increase from enrollment thru graduation. Invest in your education, career, and future without breaking the bank.

+ Learn More


With 100% online classes that start monthly, you complete your coursework when it’s most convenient for you. No set class times or locations lets you continue to work full-time, take care of your family, travel the world, or whatever else you want while you invest in your education.

+ Learn More

Learn more about the Graduate Certificate in Cyber Security.


Fill out the form below and we'll contact you and answer all of your questions.

* Required Fields

By submitting this form, I agree that CSU-Global may contact me about educational services by phone/text message. Message and data rates may apply. I understand that my consent is not required to attend CSU-Global.

Personalized Learning Paths

Customize your education and build your own unique learning path

Learn More


We use cookies to collect information about how you interact with our website, to improve and customize your browsing experience, and for analytics and metrics. Click here to find out more about the cookies we use and how you can customize your settings. If you continue to use this site, you consent to our use of cookies.