Cybersecurity Management Graduate Certificate Online - SMUMN Skip to Main Content
page-builder.php
  1. Home
  2. /
  3. Online Certificate In Cybersecurity...

Online Graduate Certificate in Cybersecurity Management

Take a Leadership Role in Cybersecurity

Are you ready to become a leader in a fast-growing field? With the online graduate certificate in Cybersecurity Management program from Saint Mary’s University of Minnesota, you’ll learn comprehensive strategies to implement security governance and business acumen building effective organizational security policies.

Industry experts teach courses in the certificate program, offering hands-on experience with cutting-edge tools for today’s cybersecurity industry. You can complete the program in as little as three semesters, graduating prepared to take on the next challenge in your industry.

This online cybersecurity management certificate program is a part of Saint Mary’s Accelerators, a carefully crafted series of master’s-level graduate certificates. Designed to advance your career to help you meet your personal and professional goals, you can pursue the certificate in a standalone program or apply your credits as a pathway toward a master’s degree.

Read More

15

credits

$760

per credit

SeptJanMay

start dates

3 semesters

completion time

Online

15

credits

$760

per credit

SeptJanMay

start dates

3 semesters

completion time

Online

Why Earn Your Graduate Certificate in Cybersecurity Management Online?

The online graduate certificate in Cybersecurity Management was created with working professionals in mind. This program delivers the expert-level skills you need to succeed in your career while maintaining your personal schedule. You can access the courses through a virtual platform at the times and in the location you prefer, allowing you to advance your education at your pace.

Program Highlights

  • Apply Graduate Certificate Credits to an M.S. in Cybersecurity Degree
  • Provides additional background surrounding CISSP, CISM and CompTIA certifications
  • Learn Valuable Information Management and Mitigation Strategies
  • No Letters of Recommendation Required
  • Official CompTIA Authorized Academic Partner 

Administer Security Strategies from the Top

As you advance through the online graduate certificate in cybersecurity management, you’ll gain the skills to lead teams of security professionals as you seek to protect sensitive data and information. You’ll engage with ways to identify potential vulnerabilities and threats, analyze possible solutions, delegate responsibilities to teams, and report conclusions to stakeholders.

“One of the hallmarks of our “accelerators” is that they are stackable into or onto full degree programs. Students can pursue a graduate certificate and then decide to continue into a full degree program in the same or a different discipline.”

-Michelle Wieser, Ph.D., Dean of the School of Business and Technology

To learn more about Saint Mary’s graduate certificate, check out this interview with Michelle Wieser.

Courses & Requirements

From the online graduate certificate in Cybersecurity Management, you will engage with a variety of topics that will prepare you to become a leader in the field. The five courses (15 credits) explore security architecture, change management, security policy, and risk management. The program’s coursework is structured to prepare you to lead teams in developing comprehensive security strategies, locating potential problem areas, and responding to unexpected breaches.

  • This course provides an overview and foundational understanding of concepts essential to the cybersecurity professional to evaluate best practices in implementing security systems within the enterprise. This course covers key bodies of knowledge in security, privacy, and compliance. Topics include security planning, risk management, security technologies, basic cryptography, digital forensics, application security, intrusion detection and prevention, physical security, and privacy issues.

    Upon completion of this course, students are expected to be able to do the following:

    • Apply the principles of information technology security
    • Analyze situations of computer and network usage from a security perspective to develop a security mindset
    • Explain information security’s importance in our increasingly computer-driven world
    • Identify appropriate strategies to ensure confidentiality, integrity, and availability of information
    • Express management’s role in the development, maintenance, and enforcement of an information security program
    • Describe the relationship among laws, regulations, and professional issues in information security
    • Articulate how cryptography serves as the central language of information security
    • Analyze how physical security fits within an information security program
    • Define the roles of computer forensics in information security
    • Apply basic software tools for assessing the security posture of a business
    • Explain how issues of privacy relate to business information security

  • This course describes the business context in which a cybersecurity professional must function within an organization. Students examine the interplay between business processes and cybersecurity issues in mitigating security threats. An overview of audit, compliance, regulation, and liability for business security are provided, along with how to construct effective continuity and disaster recovery plans, is provided.

    Upon completion of this course, students are expected to be able to do the following:

    • Manage business decisions affected by changing and diverse external and internal security threats
    • Align security functions to business strategy, goals, mission, and objectives
    • Determine compliance requirements among contractual, legal, regulatory, privacy requirements, and industry standards
    • Outline legal and regulatory issues that pertain to information security in a global context in areas such as cyber-crimes and data breaches, licensing and intellectual property requirements, import/export controls, trans-border data flow, and privacy
    • Identify, analyze, and prioritize business continuity requirements through the development of a scope and plan and business impact analysis
    • Implement disaster recovery processes and understand concepts of response, recovery personnel, communications methods, damage assessment, system restoration and training, and security awareness
    • Address security concerns related to personnel safety, travel, security training and awareness, and emergency management
    • Develop a security awareness and training program

  • In this course, students examine the roles of security policies, standards, and procedures in addressing business and technical security risks. Students explore the types of policies that are part of an overall security strategy. Policies are discussed that drive computer security, including discretionary access control, mandatory access control, and role-based access control types of policies, and how these are used in organizations. Students develop policies and deployment plans as part of the comprehensive strategic plan for the enterprise.

    Upon completion of this course, students are expected to be able to do the following:

    • Develop high-level security policies that directly support the mission, vision, and direction of an organization
    • Develop issue-specific policies to control the use of resources, assets, and activities to support the organization’s goals and objectives
    • Develop system-specific policies that express technical details for the implementation, configuration, and management of the system including configuration rules and access control
    • Develop, document, and implement security policies, standards, procedures, and guidelines
    • Create security procedures and administrative controls for the enterprise
    • Evaluate physical and logical access to assets such as information, systems, devices, and facilities
    • Manage identification, authentication, and authorization of people, devices, and services

  • This course includes a study of the existing risk management frameworks, models, processes, and tools to provide students with the theory and practical knowledge needed to operationalize risk management in an organization or government agency. Additionally, fundamental concepts in information technology security audit and control processes for an organization are discussed. Students learn to create a control structure and audit an information technology infrastructure.

    Upon completion of this course, students are expected to be able to do the following:

    • Perform a risk assessment to determine the extent that an organization’s technology assets are exposed to risk
    • Demonstrate the concepts of risk appetite and residual risk as they apply to the information assets of an organization
    • Complete a threat assessment that identifies asset vulnerabilities and ranks threats based on likelihood and financial impact
    • Apply the risk control strategies of transfer, mitigation, acceptance, and termination and how cost-benefit analysis is utilized in determining which strategy to implement
    • Employ risk assessment and analysis techniques that include risk response and countermeasure selection and implementation
    • Apply risk-based management concepts to the supply chain with an understanding of risks associated with hardware, software, and services
    • Conduct a security control testing plan that involves a vulnerability assessment, penetration testing, log reviews, synthetic transactions, code review, and interface testing
    • Verify controls are applied consistently
    • Define how business alignment, risk appetite, and risk aversion affect the security program implementation

  • This course introduces the principles and best practices for incident response, along with an overview of digital forensics. Students understand the goals of incident response and learn how to prepare and respond to information security incidents and understand how the incident occurred. Students understand the process of collecting and analyzing data, and the process of remediation. The course outlines the investigative and analysis process, tools, digital evidence, and applicable law with a focus on computer, mobile, network, and database forensics.

    Upon completion of the course, students are expected to be able to do the following:

    • Implement the basics of evidence collection and documentation, reporting, investigative techniques, digital forensics tools, and procedures
    • Interpret requirements for investigation types of administrative, criminal, civil, regulatory, and industry standards and the associated costs
    • Identify the implications of data location in responding to security incidents
    • Conduct incident management through all stages of a breach with knowledge of detection, response, mitigation, reporting, recovery, and remediation.
    • Adjust preventative measures in response to security incidents
    • Implement recovery strategies such as backup, recovery sites, multiple processing sites, and system resilience via high availability, Quality of Service (QoS), and fault tolerance
    • Develop incident reports and analysis presentations

Share Your Success

Saint Mary’s supports your success by providing you with the tools necessary to not only achieve your professional goals but to share them with the world—especially the digital world.

As part of our commitment, Saint Mary’s offers an opportunity for you to be awarded digital badges. Digital badges are a graphic verification representing your achievement after completing a specific online course or program.

Admissions

The online graduate certificate in Cybersecurity Management is financial aid eligible and can be completed in three semesters. No prerequisite coursework is required, and you don’t need GRE/GMAT scores to apply. For admission to the program, you’ll need:

  • General:

    • An undergraduate degree from a regionally accredited institution
    • A minimum GPA of 2.75 on a 4.0 scale
    • If your overall GPA is below 2.75, you may receive conditional status in the program at the discretion of the program director

  • No prerequisite coursework is required for the online cybersecurity management certificate program.

  • You don’t need GRE/GMAT scores to apply for this program.

  • Transfer credits are not accepted for this program.

  • Students with transcripts from universities outside the United States, the United Kingdom, Ireland, New Zealand, Australia, and Canada (except for the Quebec Province) must take and pass English proficiency testing

    • Test of English as a Foreign Language (TOEFL) with a minimum score of 72
    • International English Language Testing System (IELTS) with a minimum score of 6.0
    • Michigan Language Assessment Battery (MELAB) with a minimum score of 74%
    • International Test of English Proficiency (ITEP) with a minimum score of 4.0 or Pearson Test of English with a score of 51
    • Duolingo with a minimum score of 100

  • Whether you apply through our online application via hard copy, or in-person with a Saint Mary’s admissions counselor, your application must include the following items:

    Official transcripts: An official transcript issued to Saint Mary’s University of Minnesota from the institution posting the applicant’s completed degree and other relevant transcripts documenting program prerequisites and potential transfer credits must be sent separately and directly from your institution. Saint Mary’s University of Minnesota accepts official transcripts electronically from previously attended institutions. Transcripts should be sent to oladmissions@smumn.edu or mailed to:

    Transcript Processing Center
    Saint Mary’s University of Minnesota
    851 Trafalgar Court, Suite 420
    Maitland, FL 32751

    An up-to-date résumé: Include both your educational and professional experience.

    Two references: Provide the names of two people (including title, organization, email, and phone number) who can serve as professional references, if needed, during the application review process. The best references are those who know you professionally, such as current or former supervisors.

    A written statement: Your background and future goals all impact your success with Saint Mary’s and inform your education. As you prepare your written statement, think about including previous experiences, education, and your strengths and interests. Share your motivations for earning the online cybersecurity management certification and how it will contribute to your career.

  • Upcoming application deadlines for Saint Mary’s online Cybersecurity Management Graduate Certificate:

    • Spring: December 18, 2023
    • Summer: April 22, 2024
    • Fall: August 20, 2024

  • Upcoming application deadlines for Saint Mary’s online Cybersecurity Management Graduate Certificate:

    • Spring: January 8, 2024
    • Summer: May 6, 2024
    • Fall: September 3, 2024

  • Once you’ve submitted your application, expect to be notified about acceptance approximately two weeks after your submission date.

Tuition & Fees

A college education is invaluable. You can take it wherever you want to go or as far as you want to go. The cost of quality education should not get in the way of reaching your goals. Here at Saint Mary’s, we are committed to providing an accessible, quality education that is focused on enhancing your personal and professional growth. Explore cost breakdowns for tuition and other fees of the online Cybersecurity Management certificate.

Cybersecurity Management Certificate Careers & Salary

The need for trained and experienced cybersecurity leaders is growing across an array of industries. As diverse organizations aim to protect sensitive information and data, more employers are seeking qualified cybersecurity professionals. Your skills can apply to almost any industry.

Computer and Information Systems Manager

$159,0101

Information Security Analyst

$102,6002

Cybersecurity Analyst

$77,3773

Information Security Manager

$119,6314
11%

percent growth rate is expected for computer and information systems managers from 2020 to 2030, faster than the average for all occupations.1

What You'll Learn

As a graduate of this program, you will be able to:

  • Apply best practices of business administration operations
  • Develop an effective security plan
  • Lead teams in providing innovative and proactive security measures
  • Communicate technical information to non-technical audiences
  • Balance organizational needs with security architecture development

Frequently Asked Questions

Saint Mary's University of Minnesota is accredited by the Higher Learning Commission.

You may apply for admission to Saint Mary's online cybersecurity management graduate certificate program anytime. After you are admitted, you may begin taking online classes at the start of any semester: Spring, Summer, or Fall.

No. Transfer credits are not accepted for graduate certificates.

No. As long as you submit your assignments by the time, they are due, you can work and study when it is most convenient for you.

Applicants must hold a bachelor’s degree from a regionally accredited institution, along with a GPA of at least 2.75 on a 4.00. Further information about admissions requirements and the application process can be found in the admissions section on this page.

All of the support systems available to on-campus students at Saint Mary's University are available for online learners as well. If you need academic support, a team of advisers is ready to assist. Professors are just a phone call or email away, and every online Saint Mary's University student is paired with a dedicated student services coordinator who will make sure your educational and professional goals stay on track. Technical support is also available to online students 24/7 at 877-308-9954 ext. 3.

It's easy! Your journey to a more rewarding career starts by calling 877-308-9954 to speak with an enrollment counselor. Or, you can request more information, and we'll reach out to you. If you already know Saint Mary's University of Minnesota is the right place to earn your online Cybersecurity Management Certificate, go ahead and begin the Online Application Process.

No. The certificate you earn online from Saint Mary's is identical to the one offered on campus.

To earn your online Cybersecurity Management Certificate, you will complete 15 credit hours of program work. You'll be able to complete your coursework in as little as three semesters.

The program is fully online.

No, these are instructor-led courses. While there are no set class times, there are assignments with set due dates.

Yes. Certain coursework requires software that is only compatible with a Windows-based PC, and will not properly work on a Mac computer (Apple iOS). Therefore, to be successful in the program, you will either need to use a Windows-based PC or partition your Mac so that the required Windows OS software is available.

Absolutely. Many different types of financial aid are available to those who qualify. To discuss tuition rates and a number of different financial aid options, call 877-308-9954 to speak with an enrollment counselor.

Sources

  1. U.S. Bureau of Labor Statistics. “Computer and Information Systems Managers.” April 18, 2022. Retrieved July 13, 2022, from https://www.bls.gov/ooh/management/computer-and-information-systems-managers.htm.
  2. U.S. Bureau of Labor Statistics. “Information Security Analysts.” April 18, 2022. Retrieved July 13, 2022, from https://www.bls.gov/ooh/computer-and-information-technology/information-security-analysts.htm.
  3. Payscale. “Average Cybersecurity Analyst Salary.” June 28, 2022. Retrieved July 13, 2022, from https://www.payscale.com/research/US/Job=Cyber_Security_Analyst/Salary.
  4. Payscale. “Average Information Security Manager Salary.” June 26, 2022. Retrieved July 13, 2022, from https://www.payscale.com/research/US/Job=Information_Security_Manager/Salary.