{"id":13492,"date":"2019-10-23T10:35:17","date_gmt":"2019-10-23T15:35:17","guid":{"rendered":"https:\/\/web.saumag.edu\/academics\/?post_type=program&#038;p=13492"},"modified":"2025-03-07T11:09:09","modified_gmt":"2025-03-07T17:09:09","slug":"cybersecurity-certification","status":"publish","type":"program","link":"https:\/\/web.saumag.edu\/academics\/program\/cybersecurity-certification\/","title":{"rendered":"Cyber Security and Privacy Graduate Certificate"},"content":{"rendered":"<p><a href=\"https:\/\/www.valuecolleges.com\/cheapest-online-masters-of-cybersecurity-programs\/\"><img fetchpriority=\"high\" decoding=\"async\" class=\"alignleft size-medium wp-image-13127\" src=\"https:\/\/web.saumag.edu\/academics\/files\/2016\/10\/25-Most-Affordable-Online-Cybersecurity-Degrees-Masters-300x213.png\" alt=\"\" width=\"300\" height=\"213\" srcset=\"https:\/\/web.saumag.edu\/academics\/files\/2016\/10\/25-Most-Affordable-Online-Cybersecurity-Degrees-Masters-300x213.png 300w, https:\/\/web.saumag.edu\/academics\/files\/2016\/10\/25-Most-Affordable-Online-Cybersecurity-Degrees-Masters.png 520w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p>The Cyber Security and Privacy option focuses on security analytics (such as penetration testing and digital forensics), cyber defense and privacy compliance. Students are expected to have familiarity with computer systems and applications to pursue this option. Key career options include: security\/privacy architect, forensic specialist, security\/privacy compliance analyst, or pursuing doctoral studies.<\/p>\n<h3><strong>Undergraduate requirements<\/strong><\/h3>\n<p>Students should have a bachelor\u2019s degree in computer science or a related field. Students with a bachelor\u2019s degree in other areas will be considered and may be required to take up to four undergraduate courses determined by the advisor. No graduate credit is given for the completion of undergraduate courses.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The Cyber Security and Privacy option focuses on security analytics (such as penetration testing and digital forensics), cyber defense and privacy compliance. Students are expected to have familiarity with computer systems and applications to pursue this option. Key career options include: security\/privacy architect, forensic specialist, security\/privacy compliance analyst, or pursuing doctoral studies. Undergraduate requirements Students&#8230; <a class=\"more-link\" href=\"https:\/\/web.saumag.edu\/academics\/program\/cybersecurity-certification\/\"> Read More<\/a><\/p>\n","protected":false},"featured_media":16808,"menu_order":0,"template":"","format":"standard","meta":{"_acf_changed":false,"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":"","_genesis_title":"","_genesis_description":"","_genesis_noindex":"","_genesis_nofollow":"","_genesis_noarchive":"","_genesis_canonical_uri":"","_open_graph_title":"","_open_graph_description":"","_twitter_title":"","_twitter_description":"","_social_image_url":"","_social_image_id":"","redirect":"","_links_to":"","_links_to_target":""},"college_department":[18307,18324,18306],"delivery":[28834],"types":[28839,28851],"class_list":{"0":"post-13492","1":"program","2":"type-program","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"college_department-school-of-graduate-studies","8":"college_department-mathematics-and-computer-science","9":"college_department-college-of-science-and-engineering","10":"delivery-online","11":"types-certificate","12":"types-graduate","13":"entry"},"acf":{"department_college":"<a href=\"http:\/\/www.saumag.edu\/academics\/science_and_technology\/mathematics_and_computer_science\/\">Mathematics &amp; Computer Science<\/a>\u00a0\/\u00a0<a href=\"https:\/\/web.saumag.edu\/science\/\">College of Science &amp; Engineering<\/a>","Number_of_Hours":"12","Catalog Entry":"","minor_requirements":"","Degree Plans":"","Program_Contact_Info":"","Advisors":"","Accreditations":"","Admission Requirements or Deadlines":"","Testimonials":"","rankings":"","careers":"","keywords":"","custom_tab_title":"Degree Plan","custom_tab_text":"<h2 style=\"text-align: center;\"><a name=\"_Toc20751603\"><\/a><a name=\"_Toc516640001\"><\/a>Graduate Certificate in Cyber Security and Privacy<\/h2>\r\nAdmission requirements are the same as MCIS degree program requirements\r\n<p class=\"Normal1\"><span class=\"normalchar\"><b>Required coursework (12 hours):<\/b><\/span><\/p>\r\n\r\n<table>\r\n<tbody>\r\n<tr>\r\n<td>MCIS<\/td>\r\n<td>6173<\/td>\r\n<td>Information and Network Security<\/td>\r\n<\/tr>\r\n<tr>\r\n<td>MCIS<\/td>\r\n<td>6223<\/td>\r\n<td>Vulnerability and Risk Assessment<\/td>\r\n<\/tr>\r\n<tr>\r\n<td>MCIS<\/td>\r\n<td>6233<\/td>\r\n<td>Traceable Systems and Computer Forensics<\/td>\r\n<\/tr>\r\n<tr>\r\n<td>MCIS<\/td>\r\n<td>6253<\/td>\r\n<td>Privacy Compliant Systems Design<\/td>\r\n<\/tr>\r\n<\/tbody>\r\n<\/table>","completion_time":"2 years"},"_links":{"self":[{"href":"https:\/\/web.saumag.edu\/academics\/wp-json\/wp\/v2\/programs\/13492","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/web.saumag.edu\/academics\/wp-json\/wp\/v2\/programs"}],"about":[{"href":"https:\/\/web.saumag.edu\/academics\/wp-json\/wp\/v2\/types\/program"}],"version-history":[{"count":1,"href":"https:\/\/web.saumag.edu\/academics\/wp-json\/wp\/v2\/programs\/13492\/revisions"}],"predecessor-version":[{"id":15411,"href":"https:\/\/web.saumag.edu\/academics\/wp-json\/wp\/v2\/programs\/13492\/revisions\/15411"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/web.saumag.edu\/academics\/wp-json\/wp\/v2\/media\/16808"}],"wp:attachment":[{"href":"https:\/\/web.saumag.edu\/academics\/wp-json\/wp\/v2\/media?parent=13492"}],"wp:term":[{"taxonomy":"college_department","embeddable":true,"href":"https:\/\/web.saumag.edu\/academics\/wp-json\/wp\/v2\/college_department?post=13492"},{"taxonomy":"delivery","embeddable":true,"href":"https:\/\/web.saumag.edu\/academics\/wp-json\/wp\/v2\/delivery?post=13492"},{"taxonomy":"types","embeddable":true,"href":"https:\/\/web.saumag.edu\/academics\/wp-json\/wp\/v2\/types?post=13492"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}