Earn Your University of Fairfax
Information Security Professional Practices Certificate
In the Information Security Certificate (ISPP), students develop competencies in assessing threats and vulnerabilities of information systems, designing security procedures and practices that are executed in the protection of data and information systems, and analyzing the validity and reliability of information to ensure that an information system will operate at a proposed level of trust.
Admissions Requirements: A bachelor’s degree from a regionally accredited institution, a nationally accredited institution, or an appropriately certified foreign institution. A Grade Point Average (GPA) on a scale of 4.0 as described below. Additional requirements may apply.
- 2.5 GPA at the bachelor’s level, or
- 3.0 GPA for the last 9 credit hours of graduate coursework, or
- Students with a GPA between 2.0 and 2.5 must demonstrate at least 3 years of relevant professional experience. Professional experience will be evaluated by the Chief Academic Officer to ensure relevancy.
Information Security Certificate Required Courses
IA8060 Intrusion Detection, Attacks, and Countermeasures
In this course, students will examine common attack methods, technologies and countermeasures. Students will also gain the skills needed to recognize various stages and methods of attack on the enterprise. (3 credits)
- Name and describe the steps in conducting a session in hijacking
- Analyze the different types of attacks used against web servers
- Describe the anatomy of an attack
- Discuss the methodology of an attacker using a password cracker
- Differentiate between different Web browsers in regards to security and privacy features
- Describe the steps for performing SQL injection
IA8020 Security Policies, Standards and Procedures
In this course, students will explore digital forensics and computer investigations. This course will provide insight on conducting an investigation, reviewing certification requirements, determining the best data acquisition method, processing a computer investigation scene, evaluating needs for digital forensics tools, and applying forensics skills and techniques. (3 credits)
- Summarize how to conduct an investigation, including critiquing a case
- Describe components used to build a business case for developing a forensics lab
- Explain guidelines for seizing digital evidence at the scene
- Describe methods for validating and testing digital forensics tools
- Describe standard procedures in network forensics and network-monitoring tools
- Explain how to approach investigating social media communications
IA8030 Design, Development and Evaluation of Security Controls
In this course, students transform high-level policies and procedures into quantifiable and measurable controls and mechanisms that enforce data and process integrity, availability and confidentiality. (3 credits)
- To analyze the factors influencing the need for an information security program and what a program consists of.
- To evaluate information security governance and risk management.
- To evaluate information security models and management practices.
- To analyze information security policies and contingency planning.
- To evaluate personnel security and protection mechanism.
Cybersecurity Education Path
Distinguish yourself and advance your cybersecurity career by following the University of Fairfax Online Cybersecurity Education Path. No matter which graduate program you pursue, all of your courses will explore relevant cybersecurity policy and management issues, and you will complete a cybersecurity project in each course. You can apply what you learn and make significant contributions in your workplace right away.