Earn Your University of Fairfax
Enterprise Information Security Certificate
Graduate certificates represent a level of achievement of technical competencies and project experience which relate to specialized fields of practice in Information Security. In the Enterprise Information Security Certificate, students develop competencies in developing interoperable enterprise security architectures focusing on information security throughout the entire enterprise.
Admissions Requirements: A master’s degree from a regionally accredited institution, a nationally accredited institution, or an appropriately certified foreign institution. A Grade Point Average (GPA) on a scale of 4.0 as described below. Additional requirements may apply.
- Minimum of 3 years (and preferably 5 years) of relevant professional experience, and
- 3.0 GPA at the master’s level. Professional experience will be evaluated by the Chief Academic Officer to ensure relevancy
Enterprise Information Security Certificate Required Courses
IA8021 Cloud Cybersecurity
In this course students will research and analyze virtualization technology needed in today’s rapidly changing IT workplace. The course will focus on virtualization in software-defined data centers. Students learn to build virtual networks, implement high-availability clusters, enhance performance and security, and manage the virtual data center. (3 credits)
- Analyze the major applications of cloud coming in data centers including hosting a virtual data center, extending a data center, and providing disaster recovery options
- Investigate the steps and components necessary to extend a virtual data center
- Analyze the procedures and options involved in developing a backup and disaster recovery procedure for a local virtual data center
- Discuss the components of OpenStack architecture and how OpenStack products are being used and marketed by many major companies
- Identify the components of a Virtual Desktop Infrastructure and describe their functions
IA8190 Forensic Evaluation and Incident Response Management
In this course, students explore the essentials of electronic discovery and analyze issues related to cyber evidence. Using this evidence, students identify and analyze the nature of security incidents, the source of potential threats and the methods used in incident management and mitigation. Students also analyze the technical and business issues which affect the actions of the enterprise in responding to a security incident. (3 credits)
- To analyze the nature of computer security incidents and the source of potential threats.
- To prepare a report which shows knowledge of a methodology for end-to-end incident management and mitigation.
- To analyze and evaluate the business and non-technical drivers, as well as technical issues associated with incident management.
- To examine the rules of evidence to electronic security incidents in the identification of criminal actions using network trace back and computer forensics and create a plan to mitigate those incidents.
IA9150 Strategic and Technological Trends in Information Security
In this course, students will focus on the managerial aspects of information security assurance. Topics covered include access control models, information security governance, and information security program assessment and metrics. Coverage on the foundational and technical components of information security is included to reinforce key concepts. The course includes up-to-date information on changes in the field, such as national and international laws and international standards like the ISO 2700 series. (3 credits)
- Compare and contrast information security management and general business management
- Assess the importance, benefits, and desired outcomes of information security governance and how such a program would be implemented
- Analyze how risk is assessed based on the likelihood of adverse events and the effects on information assets when events occur
- Analyze popular approaches used in the industry to manage risk
- Analyze emerging trends in the certification and accreditation of U.S. federal information technology systems
Cybersecurity Education Path
Distinguish yourself and advance your cybersecurity career by following the University of Fairfax Online Cybersecurity Education Path. No matter which graduate program you pursue, all of your courses will explore relevant cybersecurity policy and management issues, and you will complete a cybersecurity project in each course. You can apply what you learn and make significant contributions in your workplace right away.