Earn your information assurance graduate certificate while building skills to stand out in the fast-growing fields of information assurance and cyber security.
Gain a practical understanding of the principles of data protection, cyber security, and computer forensics with a graduate certificate in information assurance. Perfect for midcareer professionals or career changers, you'll gain sought-after skills in network and Internet security, intrusion detection and prevention, and cryptology.
UMUC was named a National Center of Academic Excellence in Information Assurance and Cyber Defense Education by the National Security Agency and Department of Homeland Security. Source
About the Information Assurance Graduate Certificate
We've developed the information assurance curriculum in conjunction with top employers, meaning you'll gain real-world experience through interactions with actual organizations and learn job-relevant skills from case studies of real information assurance crises. Your courses will feature topics in network and internet security, intrusion detection and protection, cryptology and data protection, and computer forensics.
Through your coursework, you will learn how to
- Secure information using symmetric and asymmetric key techniques (including the Advanced Encryption Standard and RSA public key cryptography) and message integrity techniques
- Protect networks using risk analysis, defense models, security policy development, authentication and authorization controls, firewalls, packet filtering, virtual private networks (VPNs), and wireless network security
- Respond to attacks with damage assessments, data forensics, data mining, attack tracing, and system recovery processes for continuity of operation
- Identify system vulnerabilities and attack patterns and solve problems with intrusion detection tactics
In past projects, students have had the opportunity to
- Conduct laboratory simulations of real events, using the same tools and techniques as industry and government, including
- Information risk analysis
- Network packet analysis
- Forensics tools for evidence collection and preservation
- Access control techniques
- Protocol analyzers
- Intrusion detection systems
- Intrusion prevention systems
- Networking mapping tools
- Encryption/decryption tools
- Vulnerability assessments
Information Assurance Graduate Certificate Requirements
Our curriculum is designed with input from employers, industry experts, and scholars. You'll learn theories combined with real-world applications and practical skills you can apply on the job right away.
- UCSP 615
(to be taken within the first 6 credits of study)
- INFA 610
- INFA 620
- INFA 630
- INFA 640
- INFA 650
- To pursue a certificate program, you must be admitted as a UMUC student.
- You are responsible for notifying UMUC of your intention to complete certificate work before completion of your last course.
- You may begin a program by taking the certificate in that program and then completing it for your degree. But you must apply for your certificate once you have completed its requirements before finishing the master's requirements.
- All required coursework for the certificate must be completed with a minimum grade of B (3.0) in all courses for a graduate certificate. Certificate courses cannot be taken pass/fail.
- All graduate certificate requirements must be fulfilled within five consecutive years. Any transfer credits must have been earned within the five-year time frame to be applied toward a graduate certificate.
Apply Your Certificate Credits Toward a Degree
Courses in this certificate can also be applied toward
Student Clubs and Organizations
Type: Academic club
Available To: Undergraduate and Graduate
The Cyber Padawans represent UMUC at various cybersecurity events and highly competitive tournaments nationwide. Being a member of the team allows students to develop their cybersecurity skills and to network with other students with similar interests.
About the Faculty
Our world-class faculty members combine academic credentials with a wealth of experience in the field.
Faculty members in this program hold or have recently held positions including
- Chief information security officer
- Cryptologic manager
- Deputy chief of cyber security operations
- Director of server operations
- Team lead for cyber threat analysis
- Technical director of security engineering and testing
Our faculty work or have worked at organizations including
- Defense Information Systems Agency
- General Dynamics
- Johns Hopkins University Applied Physics Laboratory
- Lucent Technologies
- National Security Agency
- Science Applications International Corporation
- Transportation Security Agency
- U.S. Department of Defense
- U.S. Department of Homeland Security