Cybersecurity Technology Graduate Certificate Online - SMU Skip to Main Content
Go Back

Online Graduate Certificate in Cybersecurity Technology

Learn How To Protect Digital Assets

Develop the skills to introduce and maintain network protections for organizations across various industries with the online graduate certificate in Cybersecurity Technology from Saint Mary’s University of Minnesota. The program delivers a deep understanding of cybersecurity infrastructure, plus the knowledge to reinforce networks with practical, comprehensive security strategies.

The online certificate program is designed to help you understand the ins and outs of developing and sustaining an effective security policy. You’ll complete the program equipped with the skills to protect information resources, identify security vulnerabilities, and plan for potential cyberattacks on networks.

After completing your graduate certificate in Cybersecurity Technology online, you may continue advancing your skills by transferring your credits to a master’s degree program and completing your education faster.

Read More




per credit




start dates





per credit




start dates


Why Choose the Online Graduate Certificate in Cybersecurity Technology?

Earning your graduate certificate in Cybersecurity Technology online allows you to study on your schedule from the location of your choice. Whether you’re on the go or prefer to study in the comfort of your home, our online learning platform offers the flexibility you need to access your courses from wherever you choose. You’ll explore a challenging curriculum and receive personalized instruction from faculty on your time.

Program Highlights

  • Apply Graduate Certificate Credits to an M.S. in Cybersecurity
  • Course Topics Include Data Privacy, Ethical Hacking, and Network Security
  • No Letters of Recommendation Required

Courses & Requirements

The coursework in the online graduate certificate in Cybersecurity Technology is structured to accommodate those who want a more nuanced introduction to the hard technology skills necessary for success in the field. The five courses (15 credits) explore data privacy, ethical hacking, and network security to give you a more real-world understanding of your responsibilities in the industry.

  • Prerequisite Course

    Students who have not taken a foundational computer networking course and/or lack previous experience in the networking technology field may be required to take CYBR 590 Computer Networking (3 cr.) as part of their program.

    This course provides an overview and foundational understanding of concepts essential to the cybersecurity professional to evaluate best practices in implementing security systems within the enterprise. This course covers key bodies of knowledge in security, privacy, and compliance. Topics include security planning, risk management, security technologies, basic cryptography, digital forensics, application security, intrusion detection and prevention, physical security, and privacy issues.

    Upon completion of the course, students are expected to be able to do the following:

    • Apply the principles of information technology security
    • Analyze situations of computer and network usage from a security perspective to develop a security mindset
    • Explain information security’s importance in our increasingly computer-driven world
    • Identify appropriate strategies to ensure confidentiality, integrity, and availability of information
    • Express management’s role in the development, maintenance, and enforcement of an information security program
    • Describe the relationship among laws, regulations, and professional issues in information security
    • Articulate how cryptography serves as the central language of information security
    • Analyze how physical security fits within an information security program
    • Define the roles of computer forensics in information security
    • Apply basic software tools for assessing the security posture of a business
    • Explain how issues of privacy relate to business information security

  • This course provides a comprehensive overview of network security and intrusion detection. Students focus on methods for securing networks and utilize these methods in basic architectural design. Students will apply these methods to a cohesive network security strategy. Topics include investigation of areas such as network analysis, perimeter defense strategies, network monitoring, vulnerability, intrusion detection, and security in mobile and wireless environments.

    Upon completion of the course, students are expected to be able to do the following:

    • Implement secure design principles in network architectures
    • Integrate secure network components through knowledge of the operation of hardware, transmission media, network access control devices, endpoint security, and content distribution networks
    • Implement secure communication channels according to design that involves voice, multimedia collaboration, remote access, data communications, and virtualized networks
    • Specify procedures to recover from attacks on network systems
    • Conduct logging and monitoring activities to support intrusion detection and prevention, and event management
    • Identify threats and vulnerabilities in networked systems

  • This course introduces techniques for information distribution in such a way that data privacy is protected. It discusses models and frameworks for privacy protection that support privacy enhancements from economic, legal, and policy perspectives. Fundamentals of cryptographic theory and practice along with its applications are introduced in topics such as classical and contemporary ciphers, encryption and decryption, breaking ciphers, cryptographic protocols, and analysis tools.

    Upon completion of the course, students are expected to be able to do the following:

    • Protect privacy and understand concepts such as data owners, processors, and collection limitations, and ensure proper asset retention
    • Analyze key laws designed to protect privacy
    • Determine data security controls through an understanding of data states, standards selection, and data protection methods, and establish information and asset handling requirements
    • Develop data standards related to the data life cycle, control, specification, storage, archiving, and responsible personnel
    • Explain the basic principles of cryptography, including various cipher methods, hash functions, and cryptographic algorithms
    • Identify the major protocols used for secure communications for both wired and wireless networks

  • This course introduces the principles and best practices for incident response, along with an overview of digital forensics. Students understand the goals of incident response and learn how to prepare and respond to information security incidents and understand how the incident occurred. Students understand the process of collecting and analyzing data and the process of remediation. The course outlines the investigative and analysis process, tools, digital evidence and applicable law with a focus on computer, mobile, network, and database forensics.

    Upon completion of the course, students are expected to be able to do the following:

    • Implement the basics of evidence collection and documentation, reporting, investigative techniques, digital forensics tools, and procedures
    • Interpret the requirements for investigation types of administrative, criminal, civil, regulatory, and industry standards and the associated costs
    • Identify the implications of data location in responding to security incidents
    • Conduct incident management through all stages of a breach with knowledge of detection, response, mitigation, reporting, recovery, and remediation
    • Adjust preventative measures in response to security incidents
    • Implement recovery strategies such as backup, recovery sites, multiple processing sites, and system resilience via high availability, Quality of Service (QoS), and fault tolerance
    • Develop incident reports and analysis presentations

  • This course includes a study of theoretical and practical aspects of network and web application penetration testing. Students are able to evaluate the security of a network or system’s infrastructure and outline how hackers find and attempt to exploit any vulnerabilities. Included in the course are in-depth details on ethical hacking, including reconnaissance, vulnerability assessment, exploitation, maintaining access, and covering tracks. Current tools and methodologies are stressed.

    Upon completion of the course, students are expected to be able to do the following:

    • Explain the regulatory/legal requirements and rationale for penetration testing
    • Interpret and differentiate cyber threats and exploits in a penetration testing context
    • Distinguish key phases of ethical hacking: reconnaissance, scanning, gaining access, maintaining access, and covering the tracks
    • Perform protocol analysis using packet captures and analyze data using a network sniffer
    • Investigate and uncover network devices, operating systems, and services
    • Discover network security issues using an intrusion detection tool
    • Leverage penetration testing applications to recognize information targets across operating systems and services
    • Implement scripts and tools to assist in penetration testing
    • Deploy and test exploits targeting operating systems and services
    • Identify and exploit various vulnerabilities in web applications

Share Your Success

Saint Mary’s supports your success by providing you with the tools necessary to not only achieve your professional goals but to share them with the world—especially the digital world.

As part of our commitment, Saint Mary’s offers an opportunity for you to be awarded digital badges. Digital badges are a graphic verification representing your achievement after completing a specific online course or program.


The online graduate certificate in Cybersecurity Technology program is financial aid eligible and can be completed in three semesters. No prerequisite coursework is required, and you don't need GRE/GMAT scores to apply. For admission to the program, you'll need:

  • General:

    • An undergraduate degree from a regionally accredited institution
    • A minimum GPA of 2.75 on a 4.0 scale
    • If your overall GPA is below 2.75, you may receive conditional status in the program at the discretion of the program director

  • Students who have not taken a foundational computer networking course and/or lack previous experience in the networking technology field may be required to take CYBR 590 Computer Networking (3 cr.) as part of their program.

  • You don’t need GRE/GMAT scores to apply for this program.

  • Transfer credits are not accepted for this program.

    • Students with transcripts from universities outside the United States, the United Kingdom, Ireland, New Zealand, Australia, and Canada (except for the Quebec Province) must take and pass English proficiency testing
    • Saint Mary’s accepts the Test of English as a Foreign Language (TOEFL) with a minimum score of 72, the International English Language Testing System (IELTS) with a minimum score of 6.0, the Michigan Language Assessment Battery (MELAB) with a minimum score of 74 percent, the Pearson Test of English Academic (PTE) with a minimum score of 51, or the International Test of English Proficiency (ITEP) with a minimum score of 4.0

  • Whether you apply through our online application via hard copy, or in-person with a Saint Mary’s admissions counselor, your application must include the following items:

    $25 non-refundable application fee: Note that Saint Mary’s alumni, students seeking readmission, veterans, and active military personnel are exempt from this application fee.

    Official transcripts: An official transcript issued to Saint Mary’s University of Minnesota from the institution posting the applicant’s completed degree and other relevant transcripts documenting program prerequisites and potential transfer credits must be sent separately and directly from your institution. Saint Mary’s University of Minnesota accepts official transcripts electronically from previously attended institutions. Transcripts should be sent to or mailed to:

    Transcript Processing Center
    Saint Mary’s University of Minnesota
    851 Trafalgar Court, Suite 420
    Maitland, FL 32751

    An up-to-date résumé: Include both your educational and professional experience.

    Two references: Provide the names of two people (including title, organization, email, and phone number) who can serve as professional references, if needed, during the application review process. The best references are those who know you professionally, such as current or former supervisors.

    A written statement: Your background and future goals impact your success with Saint Mary’s and inform your education. As you prepare your written statement, think about including previous experiences, education, and your strengths and interests. Share your motivations for earning the online cybersecurity technology certification and how it will contribute to your career.

  • Upcoming application deadlines for Saint Mary’s online Cybersecurity Technology Graduate Certificate:

    • Fall: August 20, 2024
    • Spring: December 18, 2023
    • Summer: April 22, 2024

  • Upcoming start dates for Saint Mary’s online Cybersecurity Technology Graduate Certificate:

    • Fall: September 3, 2024
    • Spring: January 8, 2024
    • Summer: May 6, 2024

  • Once you’ve submitted your application, expect to be notified about acceptance approximately two weeks after your submission date.

Tuition & Fees

A college education is invaluable. You can take it wherever you want to go or as far as you want to go. The cost of quality education should not get in the way of reaching your goals. Here at Saint Mary’s, we are committed to providing a quality education that is accessible and affordable. Explore cost breakdowns for tuition and other fees of the online Cybersecurity Technology certificate.

Online Graduate Certificate in Cybersecurity Technology Careers & Salary

As more employers aim to protect their sensitive information, there has been a palpable rise in the need for trained, qualified cybersecurity professionals in practically every industry. Employers from the private sector to nonprofit organizations and governmental agencies are looking for help securing their data.

Computer and information technology employment is projected to grow 15 percent from 2021 to 2031, faster than the average for all occupations.1 The employment of information security analysts is projected to grow 35 percent from 2021 to 2031, with an average of 19,500 openings each year.2

Cybersecurity Engineer


Information Security Analyst


Cybersecurity Analyst


Information Security Manager


Data Security Analyst


What You'll Learn

As a graduate of this program, you will be able to:

  • Balance business needs and initiatives with effective security architecture
  • Communicate technical information digestibly to non-technical audiences
  • Identify vulnerabilities in networks and computer systems
  • Apply effective security measures to mitigate potential threats
  • Conduct security control testing to protect sensitive data

Frequently Asked Questions

Saint Mary's University of Minnesota is accredited by the Higher Learning Commission.

You may apply for admission to Saint Mary's online Cybersecurity Technology Graduate Certificate program anytime. After you are admitted, you may begin taking online classes at the start of any semester: Spring, Summer, or Fall.

No. Transfer credits are not accepted for graduate certificates.

No. As long as you submit your assignments by the time they are due, you can work and study when it is convenient.

Applicants must hold a bachelor’s degree from a regionally accredited institution, along with a GPA of at least 2.75 on a 4.00. Further information about admissions requirements and the application process can be found in the admissions section on this page.

All of the support systems available to on-campus students at Saint Mary's are also available for online learners. If you need academic support, a team of advisers is ready to assist. Professors are just a phone call or email away. Every online Saint Mary's student is paired with a dedicated student services coordinator who will ensure your educational and professional goals stay on track. Technical support is also available to online students 24/7 at 877-308-9954 ext. 3.

It's easy! Your journey to a more rewarding career starts by calling 877-308-9954 to speak with an enrollment counselor. Or, you can request more information, and we'll reach out to you. If you already know Saint Mary's University of Minnesota is the right place to earn your online Cybersecurity Technology Graduate Certificate, go ahead and begin the Online Application Process.

No. The certificate you earn online from Saint Mary's is identical to the one offered on campus.

To earn your online Cybersecurity Technology Certificate, you will complete 15 credit hours of program work. You'll be able to complete your coursework in as little as three semesters.

The program is entirely online.

No, these are instructor-led courses. While there are no set class times, there are assignments with set due dates.

Yes. Certain coursework requires software that is only compatible with a Windows-based PC, and will not properly work on a Mac computer (Apple iOS). Therefore, to be successful in the program, you will either need to use a Windows-based PC or partition your Mac so that the required Windows OS software is available.

Yes. Many types of financial aid are available to those who qualify. To discuss tuition rates and financial aid options, call 877-308-9954 to speak with an enrollment counselor.


  1. Bureau of Labor Statistics. “Computer and Information Technology Occupations.” September 8, 2022. Retrieved August 11, 2023, from
  2. Bureau of Labor Statistics. “Information Security Analysts.” September 8, 2022. Retrieved August 11, 2023, from
  3. Payscale. “Average Cyber Security Engineer Salary.” July 4, 2022. Retrieved July 14, 2022, from
  4. Payscale. “Average Cybersecurity Analyst Salary.” June 28, 2022. Retrieved July 13, 2022, from
  5. Payscale. “Average Information Security Manager Salary.” June 26, 2022. Retrieved July 13, 2022, from
  6. Payscale. “Average Data Security Analyst Salary.” June 22, 2022. Retrieved July 13, 2022, from