Graduate Certificate in Information Assurance and Cybersecurity
Pursue advanced knowledge of high-level information assurance and cybersecurity concepts.
Next Start Date
Get the Program Guide
Start date: 10/24/2016
Enrollment Deadline: 10/12/2016
Start date: 1/9/2017
Enrollment Deadline: 12/28/2016
Start date: 3/6/2017
Enrollment Deadline: 2/22/2017
Start date: 5/1/2017
Enrollment Deadline: 4/19/2017
Start date: 7/3/2017
Enrollment Deadline: 6/21/2017
Start date: 8/28/2017
Enrollment Deadline: 8/16/2017
Our For-Credit Graduate Certificate in Information Assurance and Cybersecurity provides essential knowledge that can help you advance to upper-level roles in network and data security. Offered 100% online through Florida Tech’s Harris Institute for Assured Information, the Graduate Certificate program gives insights into real-world cybersecurity and information assurance concepts.
What You'll Learn
In the Information Assurance and Cybersecurity program, you will explore theories and practices of computer security, including the protection of enterprise information and data communications. Credits earned can be applied later to our Master of Science in Information Assurance and Cybersecurity degree program. See sample curriculum here. Find textbooks and materials required for each specific term.
Florida Institute of Technology is accredited by the Southern Association of Colleges and Schools Commission on Colleges to award associate’s, baccalaureate, master’s, education specialist and doctoral degrees. Florida Institute of Technology also is certified by the National Security Agency (NSA) and the Department of Homeland Security as a Center of Academic Excellence in Information Assurance Research.
With the growing threat of hacks and other cyber attacks, businesses, government agencies and other organizations are seeking qualified and experienced experts to safeguard their computer networks and proprietary information. Earning a For-Credit Graduate Certificate in Information Assurance and Cybersecurity can better position you for roles such as computer security specialist, software engineer, network security engineer, and threat intelligence analyst.
Time to Complete
Weeks per class
Years to Complete