Graduate Certificate Programs

General

Program Description

Our Graduate Certificate Programs give you the Specializations Edge you need to be successful

Cyber Security is one of the fastest-growing and most undefined fields in today’s world. Globally, definitions of Cyber Security vary as much as the information that is being protected.

From government secrets and corporate intelligence; competitive advantage to the private medical information on individuals, data protection is a daunting task. Organizational roles are widely unknown and many economies are failing from a security perspective. Hackers and cybercriminals are now operating in large organized crime rings making billions of dollars from unsuspecting individuals, corporations and governments. No one is safe.

EC-Council University’s Graduate Certificate Program focuses on the competencies necessary for Cyber Security professionals to become managers, directors, and CIOs. Students will experience not only specialized technical training in a variety of IT security areas, but they will also acquire an understanding of organizational structure and behavior, the skills to work within and across that organizational structure, and the ability to analyze and navigate its hierarchy successfully. Each certificate targets skills and understandings specific to particular roles in the IT security framework of an organization. The certificates can be taken singly or as multiples up to a set of five–each building across knowledge domains from IT practitioner skill levels to IT executive skill levels.

Program Benefits

EC-Council University has created a sample framework of functional and executive roles derived roughly from the United States Department of Homeland Security Essential Body of Knowledge (EBK) as published in 2007.

Using that EBK matrix and the job roles identified in the US Department of Defense descriptions (DODD8570.2) and corporate/industry input, the organization of the ECCU Graduate Certificate Program was created.

Born from the ECCU Master of Security Science Curriculum and mapped to industry standards, each graduate certificate contains a series of benefits:

  • Preparation for Industry Recognized Certifications
  • NSA Program Mappings
  • Executive Leadership Development
  • Masters Level Education
  • Promoting Critical Thinking
  • Ethical Practice
  • Scholarship & Research

Specific courses in the certificates satisfy program requirements for the federal NSTISSI (National Security Telecommunications and Information Systems Security Committee) 4011, 4012, 4013A, 4014, 4015, and 4016 standards for Information Systems Security Professionals, Designated Approving Authorities, System Administration in Information Systems Security, Information System Security Officer, Systems Certifier and Information Security Risk Analyst, respectively.

The specified courseware has been certified at the highest national level by the Committee on National Security Systems (CNSS) and maps to the NSTISSI standards listed above.

The graduate certificates build upon each other, moving students through levels of skills and understandings increasingly directed to managerial and leadership positions in Cyber Security.

Graduate certificates do not guarantee certification but do prepare students to challenge the various independent industry examinations.

Program Delivery

EC-Council University programs are delivered 100% online. Through years of adult learning experience, EC-Council University has refined the course delivery to include online delivery methods with instructor-led e-learning components alongside individual assignments to create a successful, flexible learning environment to meet the tough scheduling requirements of today’s busy IT professionals.

Duration

Each program can be completed in 3 to 9 months.

130453_coding-computer-data-depth-of-field-577585.jpg

Our Graduate Certificate Programs

Information Security Professional

The Information Security Professional Graduate Certificate focuses on three areas:

  • Ethical hacking & Countermeasures
  • Managing Secure Network Systems
  • Research and Writing

The unique combination of these content areas creates the functional and organizational skill set required to design and direct the implementation of any information security plan. Upon completion of the certificate, the student will possess the ability to build, maintain, test and communicate a secure structure at every level of the organization.

This certificate provides the framework for the four subsequent certificates and/or the Master of Security Science.

Job Roles

  • Ethical hackers
  • System Administrators
  • Network Administrators and Engineers
  • Auditors
  • Information Assurance (IA) Security Officer
  • Information Security Analyst/Administrator
  • Information Security Manager/Specialist
  • Information Systems Security Engineer/Manager
  • Security Analyst
  • Information Security Officers
  • Information Security Auditors
  • Risk/Vulnerability Analyst
  • Network Administrators
  • Network Security Administrators
  • Network Security Engineer
  • Network Defense Technicians
  • CND Analyst
  • Security Operator

Security Analyst

This concentration focuses on testing methods and techniques to effectively identify and mitigate risks to the security of a company’s infrastructure while providing application and network-based security vulnerability assessments, penetration tests, securing wireless networks including authentication, authorization, and encryption in accordance with industry-accepted methods and protocols.

Job Roles

  • Information Security Manager/Specialist
  • Information Security Auditor
  • Risk/Vulnerability Analyst/Manager
  • Information Security Analyst
  • Penetration Tester
  • Security Architect
  • Computer Network Defender
  • Cybersecurity Defense Analyst
  • Information Security (IS) Director
  • Information Assurance (IA) Program Manager
  • IT Project Manager
  • Application Security Engineer/Manager
  • Enterprise Architect
  • Security Architect
  • Research & Development Specialist
  • Systems Requirements Planner
  • System Testing and Evaluation Specialist
  • Information Systems Security Developer
  • Systems Developer
  • Technical Support Specialist
  • Network Operations Specialist
  • System Administrator
  • Systems Security Analyst
  • Cyber Defense Analyst
  • Cyber Defense Infrastructure Support Specialist
  • Vulnerability Assessment Analyst
  • Warning Analyst
  • Exploitation Analyst
  • All-Source Analyst
  • Mission Assessment Specialist
  • Target Developer
  • Target Network Analyst
  • Multi-Disciplined Language Analyst
  • All Source-Collection Manager
  • All Source-Collection Requirements Manager
  • Cyber Intel Planner
  • Cyber Ops Planner
  • Partner Integration Planner
  • Cyber Operator
  • Chief Information Security Officer
  • Information Security Officer
  • Chief Security Officer
  • Information Assurance Security Officer

Prerequisites

  • ECCU 501 – Ethical Hacking must be completed before ECCU 503 Security Analysis and Vulnerability Assessment can be taken.
  • ECCU 503 Security Analysis and Vulnerability Assessment must be completed before ECCU 506 Conducting Penetration and Security Testing can be taken.

Enterprise Security Architect

This concentration focuses on planning, analyzing, designing, configuring, testing, implementing, maintaining, and supporting an organization’s computer and network security infrastructure. It also covers hardening enterprise architecture from the most advanced attacks, secure programming practices to overcome these inherent drawbacks to preempt bugs from the code and designing and implementing cloud security.

Job Roles

  • IT analyst
  • Systems analyst
  • Computer Network Architect
  • Enterprise Architect
  • Security Architect
  • Systems Requirements Planner
  • System Testing and Evaluation Specialist
  • Information Systems Security Developer
  • Systems Developer
  • Technical Support Specialist
  • Network Operations Specialist
  • System Administrator
  • Systems Security Analyst
  • Chief Information Security Officer
  • Information Security Officer
  • Chief Security Officer
  • Information Assurance Security Officer

Prerequisites

  • ECCU 501 – Ethical Hacking and Countermeasures must be completed before ECCU 520 Advanced Network Defense and ECCU 524 Designing and Implementing Cloud Security and Security can be taken.

Digital Forensics

This Graduate Certificate focuses on planning, analyzing, designing, configuring, testing, implementing, maintaining, and supporting an organization’s computer and network security infrastructure. It also covers hardening enterprise architecture from the most advanced attacks, secure programming practices to overcome these inherent drawbacks to preempt bugs from the code and designing and implementing cloud security.

Job Roles

  • Forensic Analyst
  • Cyber Crime Investigator
  • Cyber Defense Forensics Analyst
  • Incident Responder
  • Chief Information Security Officer
  • Information Security Officer
  • Chief Security Officer
  • Information Assurance Security Officer

Prerequisites

  • ECCU 505 Research and Writing for the IT Practitioner must be completed before ECCU 517 Cyber Law can be taken.
  • ECCU 501 – Ethical Hacking and Countermeasures and ECCU 502 Investigating Network Intrusions and Computer Forensics must be completed before ECCU 521 Advanced Mobile Forensics and Security can be taken.

Incident Management and Business Continuity

This concentration focuses on handling and responding to various security incidents, identifying vulnerabilities and taking appropriate countermeasures to prevent information failure risks, and the skills to identify, structure, forecast, envision, design, plan, implement, account for, and lead a team through change that has been strategically planned to advance the organization.

Job Roles

  • Director/Manager – Business Continuity
  • Information Assurance (IA) Program Manager
  • IT Project Manager
  • Disaster Recovery Analyst/Manager
  • Director/Manager – Business Continuity
  • Cyber Defense Incident Responder
  • Incident Handler
  • Incident Manager
  • Incident Responder
  • Disaster Recovery Program Manager
  • Disaster Recovery Analyst
  • IT Disaster Recovery Analyst
  • Chief Information Security Officer
  • Information Security Officer
  • Chief Security Officer
  • Information Assurance Security Officer

Prerequisites

  • ECCU 505 Research and Writing for the IT Practitioner must be completed before ECCU 512 Beyond Business Continuity: Managing Organizational Change can be taken.
  • ECCU 501 – Ethical Hacking and must be completed before ECCU 522 Incident Handling and Response can be taken.

Executive Leadership in Information Assurance

This Graduate Certificate focuses on providing the fundamental skills that are needed to understand global leadership concepts, bring together all the components required for a C-Level position, and providing students with the knowledge of how to manage IT security projects to enhance the success rate for both organizations and IT managers.

Job Roles

  • IT Project Manager
  • Chief Information Security Officer
  • Information Security Officer
  • Chief Security Officer
  • Information Assurance Security Officer

Prerequisites

  • ECCU 505 Research and Writing for the IT Practitioner must be completed before ECCU 511 Global Business Leadership can be taken.
  • ECCU 501 – Ethical Hacking and must be completed before ECCU 523 Executive Governance and Management can be taken.
130452_woman-standing-while-carrying-laptop-1181354.jpg

Pricing

Region 1
$540/Per Credit Hour
Region 2
$473/Per Credit Hour
Region 1
$405/Per Credit Hour
Application Fee: $65 Application Fee: $65 Application Fee: $65
Technology Fee: $50 per term Technology Fee: $50 per term Technology Fee: $50 per term
Graduation Fee: $150 Graduation Fee: $150 Graduation Fee: $150
Transcript fee: $10+Shipping** Transcript fee: $10+Shipping** Transcript fee: $10+Shipping**
Transcript fee: $10+shipping** Transcript fee: $10+shipping** Transcript fee: $10+shipping**
Transcript w/Apostille: $20+shipping** Transcript w/Apostille: $20+shipping** Transcript w/Apostille: $20+shipping**
Specialization: Security Analyst
Exam Fee: $800
iLab Fee: $200
Specialization: Security Analyst
Exam Fee: $800
iLab Fee: $200
Specialization: Security Analyst
Exam Fee: $800
iLab Fee: $200
Specialization: Executive Leadership in Information
Assurance Exam Fee: $999
Specialization: Executive Leadership in Information
Assurance Exam Fee: $999
Specialization: Executive Leadership in Information
Assurance Exam Fee: $999
Last updated Feb 2020

About the School

With a mission to create superior educational programs in cybersecurity, EC-Council University was incorporated in Wyoming and licensed by the New Mexico Higher Education Department in 2006. The unive ... Read More

With a mission to create superior educational programs in cybersecurity, EC-Council University was incorporated in Wyoming and licensed by the New Mexico Higher Education Department in 2006. The university was founded by Mr. Jay Bavisi, the CEO of EC-Council Group. The institution aims to deliver information security education involving in-depth knowledge of a wide array of software and hardware systems as well as skills required to negotiate and lead a team. Read less