Online Graduate Certificate

Online Graduate Certificate[/br]Cybersecurity

Cybersecurity Certificate Program Overview

Break into the growing cybersecurity field.

Increasing numbers of breaches and other online security cyber attacks have created a huge demand for qualified professionals across every industry. The U.S. Bureau of Labor projects 28% growth in security analyst roles from 2016 to 2026, and other global research suggests there will be a shortage of 1.8 million cybersecurity professionals by 2022.

St. Bonaventure University’s online Graduate Certificate in Cybersecurity will provide an overview of the cybersecurity field that can complement your current work in a variety of fields including law enforcement, military, government agencies, and more. After completing these five courses you’ll gain the confidence to speak the language and bring an understanding of the cybersecurity landscape to your current role.

Develop a real-world cybersecurity skill set.

Through our relationship with the WNY Cybersecurity Research Center and the Security Operations Center located at SBU, the online Graduate Certificate in Cybersecurity program is able to bring active business and research professionals into the learning environment. It’s an immersive and one-of-a-kind connection that allows you to experience global cybersecurity practice as it happens – in real time, while preparing you for the realities of cybersecurity like no other online program can.

Fast Facts

  • Prepare for Certifications: SBU is a partner with the EC-Council and CISCO Academy
  • Get More for Your Money: Ranked #1 Best Value School in New York State by U.S. News and World Report, Top 300 Best College Values by Kiplinger’s Personal Finance
  • Choose Quality: Named as one of The Princeton Review’s Best 382 Colleges
  • Enjoy Flexibility: 100% online, no GMAT requirement and six start dates per year
  • Accessibility: No computer science background required
  • Prepares You for SBU's Online MS in Cybersecurity


Get More Information

CYB 500A | Computers and Cyber World

This course is an introduction to cybersecurity, including computer hardware and organization, number systems, types of data, discrete mathematics and logic, algorithms, files and data structures, operating systems and compilers, virtual machines, Linux, security, privacy, threats, identity, and introduction to technical, legal & policy issues in cybersecurity.

CYB 500B | Introduction to Programming

This course introduces the object-oriented approach to software design using the programming language, like Java or Python. Both languages are used to implement software designs. No previous programming experience is needed.

CYB 500C | Introduction to Databases

An introduction to database management systems is given, including database design and application development. Different database models are introduced, with emphasis on the relational model. The theoretical principles underlying the design of a database and the physical storage of data and its integrity are covered. Other conceptual points such as relations in mathematics that form the bases of a relational model are discussed. Along with designing and implementing databases using Sequel Server, the student will create a GUI interface to a database using JDBC and JavaFX.

CYB 500 | Computer Networks

A study of computer networks based on the OSI model of a layered network architecture. The TCP/IP protocol suite is used to illustrate network protocols. The course includes an overview of local area networks, routing algorithms, and network applications. The course consists of three lecture hours and one two-hour laboratory per week. The laboratory component provides experience in network programming using sockets.

CYB 501: Foundations of Cybersecurity, Ethical Hacking, Penetration Testing

To provide students with a fundamental understanding of cybersecurity and an in-depth understanding of penetration testing and ethical hacking. This course will include intelligence gathering, assessment of software vulnerabilities and weaknesses, cross platform penetration testing, learning ethical hacking requirements, and data protection.