About: Protecting information systems is key to protecting the nation's critical infrastructures. Only through diligence and a well-trained workforce will we be able to adequately defend the nation's vital information resources. Cyber Security has one of the largest demands for an educated workforce within the federal, state, and industry domains.
This certificate meets a majority of the requirements for the National Initiative for Cyber Security Education (NICE) standards for the NSA-DHS Center of Academic Excellence program.
Term: 1 to 3 years to graduate
Today's the day to advance your career with our in-person or distance programs, conveniently located in St. Louis.
Graduate Certificate Requirements:
An overview of information security operations, access control, risk management, systems and application life cycle management, physical security, business continuity planning, telecommunications security, disaster recovery, software piracy, investigations, ethics and more. There will be extensive reporting, planning and policy writing.
Introduces fundamentals of modern cryptography. Topics include basic number theory, public & private key encryption schemes, cryptographic hash functions, message authentication codes, elliptic curve cryptography, Diffie-Hellman key agreements, digital signatures, PUFs, quantum cryptography, and generation of prime numbers and pseudo-random sequences.
The course presents various vulnerabilities and threats to information in cyberspace and the principles and techniques for preventing and detecting threats and recovering from attacks. The course deals with various formal models of advanced information flow security. A major project will relate theory to practice.
This course covers basic tools, in statistics and cryptography, commonly used to design privacy-preserving and secure protocols in a distributed environment as well as recent advances in the field of privacy-preserving data analysis, data sanitization and information retrieval.
Covers facets of cloud computing and big data management, including the study of the architecture of the cloud computing model with respect to virtualization, multi-tenancy, privacy, security, cloud data management and indexing, scheduling and cost analysis; it also includes programming models such as Hadoop and MapReduce, crowdsourcing, and data provenance.
Topics covered include network security issues such as authentication, anonymity, traceback, denial of service, confidentiality, forensics, etc. in wired and wireless networks. Students will have a clear, in-depth understanding of state of the art network security attacks and defenses.