0(0)

Graduate Certificate Program

  • Course level: Intermediate
  • Last Update 27/03/2021

Description

Cybersecurity is one of the fastest-growing and most undefined fields in today’s world. Globally, definitions of cybersecurity vary as much as the information that is being protected.

From government secrets and corporate intelligence to competitive advantage and the private medical information on individuals, data protection is a daunting task. Organizational roles are widely unknown, and many economies are failing from a security perspective. Hackers and cybercriminals now operate in large organized crime rings making billions of dollars from unsuspecting individuals, corporations, and governments. No one is safe.

EC-Council University’s Graduate Certificate Program focuses on the competencies necessary for cybersecurity professionals to become managers, directors, and CIOs. Students will experience not only specialized technical training in a variety of IT security areas, but they will also acquire an understanding of organizational structure and behavior, the skills to work within and across that organizational structure, and the ability to analyze and navigate its hierarchy successfully. Each certificate targets skills and understandings specific to particular roles in the IT security framework of an organization. The certificates can be taken individually or as multiples of up to five––each building across knowledge domains from IT practitioner skill levels to IT executive skill levels.

Program Delivery:

EC-Council University programs are delivered 100% online. EC-Council University has refined the course delivery to include online delivery methods with instructor-led e-learning components alongside individual assignments to create a successful, flexible learning environment to meet the tough scheduling requirements of today’s busy IT professionals.

Transfer of Credits:

Turn Your Certification into a Degree!

As a prospective EC-Council University student and current EC-Council Certification holder, you can also earn credits toward your courses based on your prior learning/industry certifications.

Application Fees

The application fee is $65.00 USD and is non-refundable.

Our Graduate Certificate Programs

Information Security Professional

The Information Security Professional Graduate Certificate focuses on three areas:

  • Ethical hacking & Countermeasures
  • Managing Secure Network Systems
  • Research and Writing

The unique combination of these content areas creates the functional and organizational skill set required to design and direct the implementation of any information security plan. Upon completion of the certificate, the student will possess the ability to build, maintain, test, and communicate a secure structure at every level of the organization.

This certificate provides the framework for the four subsequent certificates and/or the Master of Security Science.

Required Courses

Required courses also prepare students to sit for the corresponding EC-Council certifications.

  • ECCU 500 Managing Secure Network Systems
  • ECCU 501 Ethical Hacking and Countermeasures
  • ECCU 505 Research and Writing for the IT Practitioner

Job Roles

  • Ethical hackers
  • System Administrators
  • Network Administrators and Engineers
  • Auditors
  • Information Assurance (IA) Security Officer
  • Information Security Analyst/Administrator
  • Information Security Manager/Specialist
  • Information Systems Security Engineer/Manager
  • Security Analyst
  • Information Security Officers
  • Information Security Auditors
  • Risk/Vulnerability Analyst
  • Network Administrators
  • Network Security Administrators
  • Network Security Engineer
  • Network Defense Technicians
  • CND Analyst
  • Security Operator

Security Analyst

This concentration focuses on testing methods and techniques to effectively identify and mitigate risks to the security of a company’s infrastructure while providing application and network-based security vulnerability assessments, penetration tests, and securing wireless networks including authentication, authorization, and encryption in accordance with industry-accepted methods and protocols.

Required Courses

Required courses also prepare students to sit for the corresponding EC-Council certifications.

  • ECCU 503 Security Analysis and Vulnerability Assessment
  • ECCU 506 Conducting Penetration and Security Testing
  • ECCU 509 Securing Wireless Networks

Job Roles

  • Information Security Manager/Specialist
  • Information Security Auditor
  • Risk/Vulnerability Analyst/Manager
  • Information Security Analyst
  • Penetration Tester
  • Security Architect
  • Computer Network Defender
  • Cybersecurity Defense Analyst
  • Information Security (IS) Director
  • Information Assurance (IA) Program Manager
  • IT Project Manager
  • Application Security Engineer/Manager
  • Enterprise Architect
  • Security Architect
  • Research & Development Specialist
  • Systems Requirements Planner
  • System Testing and Evaluation Specialist
  • Information Systems Security Developer
  • Systems Developer
  • Technical Support Specialist
  • Network Operations Specialist
  • System Administrator
  • Systems Security Analyst
  • Cyber Defense Analyst
  • Cyber Defense Infrastructure Support Specialist
  • Vulnerability Assessment Analyst
  • Warning Analyst
  • Exploitation Analyst
  • All-Source Analyst
  • Mission Assessment Specialist
  • Target Developer
  • Target Network Analyst
  • Multi-Disciplined Language Analyst
  • All Source-Collection Manager
  • All Source-Collection Requirements Manager
  • Cyber Intel Planner
  • Cyber Ops Planner
  • Partner Integration Planner
  • Cyber Operator
  • Chief Information Security Officer
  • Information Security Officer
  • Chief Security Officer
  • Information Assurance Security Officer

Prerequisites

  • ECCU 501: Ethical Hacking must be completed before ECCU 503: Security Analysis and Vulnerability Assessment can be taken.
  • ECCU 503: Security Analysis and Vulnerability Assessment must be completed before ECCU 506: Conducting Penetration and Security Testing can be taken.

Enterprise Security Architect

This concentration focuses on planning, analyzing, designing, configuring, testing, implementing, maintaining, and supporting an organization’s computer and network security infrastructure. It also covers hardening enterprise architecture from the most advanced attacks, secure programming practices to overcome these inherent drawbacks to pre-empt bugs from the code and designing and implementing cloud security.

Required Courses

Required courses also prepare students to sit for the corresponding EC-Council certifications.

  • ECCU 510 Secure Programming
  • ECCU 520 Advanced Network Defense
  • ECCU 524 Designing and Implementing Cloud Security and Security

Job Roles

  • IT analyst
  • Systems analyst
  • Computer Network Architect
  • Enterprise Architect
  • Security Architect
  • Systems Requirements Planner
  • System Testing and Evaluation Specialist
  • Information Systems Security Developer
  • Systems Developer
  • Technical Support Specialist
  • Network Operations Specialist
  • System Administrator
  • Systems Security Analyst
  • Chief Information Security Officer
  • Information Security Officer
  • Chief Security Officer
  • Information Assurance Security Officer

Prerequisites

  • ECCU 501: Ethical Hacking and Countermeasures must be completed before ECCU: 520 Advanced Network Defense and ECCU 524: Designing and Implementing Cloud Security and Security can be taken.

Digital Forensics

This graduate certificate focuses on planning, analyzing, designing, configuring, testing, implementing, maintaining, and supporting an organization’s computer and network security infrastructure. It also covers hardening enterprise architecture from the most advanced attacks, secure programming practices to overcome these inherent drawbacks to pre-empt bugs from the code and designing and implementing cloud security.

Required Courses

Required courses also prepare students to sit for the corresponding EC-Council certifications.

  • ECCU 502 Investigating Network Intrusions and Computer Forensics
  • ECCU 517 Cyber Law
  • ECCU 521 Advanced Mobile Forensics and Security

Job Roles

  • Forensic Analyst
  • Cyber Crime Investigator
  • Cyber Defense Forensics Analyst
  • Incident Responder
  • Chief Information Security Officer
  • Information Security Officer
  • Chief Security Officer
  • Information Assurance Security Officer

Prerequisites

  • ECCU 505: Research and Writing for the IT Practitioner must be completed before ECCU 517: Cyber Law can be taken.
  • ECCU 501: Ethical Hacking and Countermeasures and ECCU 502: Investigating Network Intrusions and Computer Forensics must be completed before ECCU 521: Advanced Mobile Forensics and Security can be taken.

Incident Management and Business Continuity

This concentration focuses on handling and responding to various security incidents, identifying vulnerabilities and taking appropriate countermeasures to prevent information failure risks, and the skills to identify, structure, forecast, envision, design, plan, implement, account for, and lead a team through change that has been strategically planned to advance the organization.

Required Courses

Required courses also prepare students to sit for the corresponding EC-Council certifications.

  • ECCU 512 Beyond Business Continuity: Managing Organizational Change
  • ECCU 513 Disaster Recovery
  • ECCU 522 Incident Handling and Response

Job Roles

  • Director/Manager – Business Continuity
  • Information Assurance (IA) Program Manager
  • IT Project Manager
  • Disaster Recovery Analyst/Manager
  • Director/Manager – Business Continuity
  • Cyber Defense Incident Responder
  • Incident Handler
  • Incident Manager
  • Incident Responder
  • Disaster Recovery Program Manager
  • Disaster Recovery Analyst
  • IT Disaster Recovery Analyst
  • Chief Information Security Officer
  • Information Security Officer
  • Chief Security Officer
  • Information Assurance Security Officer

Prerequisites

  • ECCU 505: Research and Writing for the IT Practitioner must be completed before ECCU 512: Beyond Business Continuity – Managing Organizational Change can be taken.
  • ECCU 501: Ethical Hacking and must be completed before ECCU 522: Incident Handling and Response can be taken.

Executive Leadership in Information Assurance

This graduate certificate focuses on providing the fundamental skills that are needed to understand global leadership concepts, bring together all the components required for a C-Level position, and providing students with the knowledge of how to manage IT security projects to enhance the success rate for both organizations and IT managers.

Required Courses

Required courses also prepare students to sit for the corresponding EC-Council certifications.

  • ECCU 511 Global Business Leadership
  • ECCU 523 Executive Governance and Management
  • ECCU 515 Project Management in IT Security

Job Roles

  • IT Project Manager
  • Chief Information Security Officer
  • Information Security Officer
  • Chief Security Officer
  • Information Assurance Security Officer

Prerequisites

  • ECCU 505: Research and Writing for the IT Practitioner must be completed before ECCU 511: Global Business Leadership can be taken.
  • ECCU 501: Ethical Hacking and must be completed before ECCU 523: Executive Governance and Management can be taken.

Official Identification

Include a clear scan of your government-issued identification.

We will accept:

U.S. applicants
  • Driver’s license
  • State-issued ID card
  • U.S. Passport

International applicants

  • Official Government ID
  • Driver’s license
  • Passport

 

What Will I Learn?

  • Preparation for Industry Recognized Certifications
  • NSA Program Mappings
  • Executive Leadership Development
  • Master’s Level Education
  • Promoting Critical Thinking
  • Ethical Practice
  • Scholarship & Research
Free

Material Includes

  • Each program can be completed in 3 to 9 months.

Requirements

  • In order to qualify for admission to the MSCS or the graduate certificate program at EC-Council University, all enrolling students must be 18 years of age and have earned a Bachelor’s degree from an appropriately accredited institution with a cumulative grade point average (GPA) of 2.5 or better.
  • Students whose undergraduate degrees are not in or related to the subject of information technology will be further evaluated based on work experience in the field and/or certifications achieved in information technology prior to an admission decision.
  • Applicants who have been denied admission may appeal the decision to the Dean.
  • Current Resume