You’ve demonstrated your skills in cybersecurity. Now gain the knowledge you need to pursue opportunities in leadership roles with our Graduate Cybersecurity Certificate. We’ll prepare you with the tools and skills to help businesses and government organizations protect data, manage risk and recover from cyberattacks. This program is aligned to the ISACA Certified Information Systems Auditor (CISA).
Perform information systems (IS) auditing processes
Execute IT governance and management
Protect information assets
Acquire, develop, implement, operate, maintain and support IS
This course introduces the role of computer information systems in today's business environment. An overview is presented of the infrastructure, data, network, software, and hardware that make up computer information systems, the systems development process, and state-of-the-business topics of which management personnel should be aware.
This course focuses on information systems auditing, IT governance, and protection of information assets. An audit preparation guide is created. Applicable laws, regulations, standards, guidance, techniques, and professional ethics will be applied. Control self-assessment is evaluated as a process of continuous IS audit preparation.
This course provides an introduction to how data is architected and organized. It discusses the different data models used to store data, outlines several schemas that drive how data is structured, and provides other database concepts relating to the design and architecture of data.
This course provides an intensive workshop where the student will gain the hands-on experience and knowledge required to provide assurance that practices for the acquisition, development, testing, and implementation of information systems meet the enterprise's strategies and objectives. This course is based on the Information Systems Acquisition, Development and Implementation Domain of the ISACA Model Curriculum for IS Audit and Control. ISACA is a leading global provider of knowledge, certifications, community, advocacy, and education on information systems (IS) assurance and security, enterprise governance and management of IT, and IT-related risk and compliance.
The Information Systems Operations, Maintenance and Support domain is divided into ten topic areas that focus on service level management, maintenance of information systems, problem and incident management, change and configuration management, and backup and restoration of systems. The objective of this domain is to ensure that students understand and can provide assurance that the practices for systems operations and maintenance meet the enterprise's strategies and objectives.
The Protection of Information Assets domain is divided into five topic areas that focus on design and implementation of system and security controls, data classification, physical access, and the process of retrieving and disposing of information assets. The objective of this domain is to ensure that students understand and can provide assurance that the enterprise's security policies, standards, procedures, and controls ensure the confidentiality, integrity, and availability of information assets.
CIS/568: INFORMATION SYSTEMS CONCEPTS
BSA/505: IS AUDITING PROCESSES
BSA/510: IT GOVERNANCE AND MANAGEMENT
BSA/515: ACQUISITION, DEVELOPMENT AND IMPLEMENTATION OF IS
BSA/520: OPERATIONS, MAINTENANCE AND SUPPORT OF IS
BSA/525: INFORMATION ASSETS PROTECTION
General Education Courses:
Your academic counselor will help schedule your courses for a Graduate Cybersecurity Certificate.
Paying for school
Cost per credit
Keep the same fixed, affordable tuition from start to finish of your degree program, even if it takes longer than you planned. That’s our promise: no matter what surprises life brings, you can count on us.
NEED SOME HELP?
Our enrollment representatives can help answer your questions, so you can make an informed choice about going back to school. Reach us by phone at (844) 937-8679 or
chat with us 5 days a week.
NEED SOME HELP?
Our enrollment representatives can help answer your questions, so you can make an informed choice about going back to school. Reach us by phone at 844-937-8679 or
chat with us 5 days a week.
University of Phoenix is accredited by the Higher Learning Commission (HLC), hlcommission.org. Since 1978, University of Phoenix has been continually accredited by the Higher Learning Commission and its predecessor.
Average years of industry experience
Chief Technology Officers
As a faculty member, I'm on your team. I'm your coach and your cheerleader."