Students
Tuition Fee
Not Available
Start Date
Not Available
Medium of studying
Not Available
Duration
Not Available
Details
Program Details
Degree
Courses
Major
Cybersecurity | Information Systems | Information Technology
Area of study
Information and Communication Technologies
Course Language
English
About Program

Program Overview


Certificate of Graduate Study in Information Security

Overview

The 15-credit Graduate Certificate in Information Security at UAlbany equips students with the business knowledge, technical skills, and hands-on training needed to protect digital information from malevolent attacks and successfully compete for information security jobs.


Program of Study

The program is designed for both recent graduates and experienced professionals looking for a post-graduate credential that will help them launch their career in the fast-growing field of cybersecurity. Flexible course options let students focus on their particular area of interest.


Required Courses

  • Information Security Risk Assessment
  • Database Design and Applications
  • Introduction to Information and Cyber Security

Specialization Courses

Students are required to take at least one of the following courses. They can also take up to two additional courses from this list as elective courses.


  • Security Policies
  • Computer Forensics
  • Digital Forensics
  • Incident Handling
  • Security Implementation

Elective Courses: Choose One or More

  • International Cyber Conflicts
  • Supervisory Control and Data Acquisition (SCADA) Forensics
  • Multimedia Forensics
  • Psychology and Information Security
  • Mathematical Methods for Information Security
  • Statistical Methods for Forensic Accounting and Assurance
  • Internal Controls and Financial Information Systems
  • Auditing of Advanced Accounting Systems
  • Field Study in Information Technology Management
  • Independent Study in Information Systems or Information Technology
  • Up to two specialization course options as indicated above

Admissions Requirements

Deadlines

  • Fall: August 1
  • Spring: January 1
  • Summer: June 1

Required Application Materials

  • Transcripts from all schools attended
  • Two letters of recommendation
  • Resume
  • Statement of Goals

International Students

This degree is designated as a STEM program. International students maintaining F-1 status are allowed to apply for up to 12 months of post-completion Optional Practical Training (OPT) following completion/graduation from their degree program.


Careers in Information Security

Information security is a growing field with an increasingly high market demand for trained professionals. Working professionals and recent college graduates typically earn the information security certificate to be able to switch career fields and/or gain an advantage when applying for cybersecurity jobs.


Sample Job Titles

  • Information Security Analyst
  • Security and Forensic Auditor
  • Incident Response Manager
  • Security Policy Administrator
  • Cybersecurity Defense Specialist

Alumni Testimonials

"The Information Security program was incredibly rewarding. Through courses and internships, I learned about risk assessments, firewalls, encryption, and specific digital forensics techniques that will help me advance at work. I’m feeling enthusiastic about my career in cyber security."


—Cindy Ogando '15


"Attending UAlbany was definitely the right choice for me! I was able to earn both my MBA and Graduate Certificate in Information Security in only two years… I don’t know if I could have accomplished this at any other university."


—Falita Friday '15


"After serving the Marine Corps for 12 years, I wanted to start a new chapter in my life. I’ve always enjoyed working with computers, and it’s rewarding to be able to fend off cyber criminals."


—Kenneth Oliver '15


"I started the information security certificate program with prior computer forensics experience working for the federal government. By continuing my education in this emerging field, I’ve learned about network structure, security, and how cyber-attacks happen."


—Steve Rossello, '16


See More