Graduate Certificate in Computer Security

Explore topics like cryptography, secure programming, security protocols, firewalls, intrusion detection, and social engineering. Continue on with in-depth material on advanced crypto and protocols, honeypots, wireless network security, and attacker techniques, and LDAP complemented with hands-on lab exercises.

Software developers, system administrators, IT and R&D managers, business professionals with sufficient background, and legal professionals will gain a broad set of technologies unique to the problem of securing computing platforms.

Certificate Completion Requirements

Effective fall 2015, in order to complete the Graduate Certificate in Computer Security, students must finish the four required SEIS courses with a GPA of 2.7 or better. Students will be able to use the Graduate Certificate in Computer Security as a base to continue in the Master of Science degree.

Current and inactive students who are enrolled in this program prior to Fall 2015 may opt to remain with the graduate program requirements from their current catalog, or move forward to the newest graduate program requirements for the Graduate Certificate in Computer Security.

Please note: Students who are in a Graduate Programs in Software master's track cannot transfer into this certificate program midstream; however, a student may complete this certificate after completing a master’s degree.

Required Courses

Required Courses [4 courses]:

  • SEIS 663  Information Technology Security and Networking  
  • SEIS 720  Computer Security 
  • SEIS 721  Advanced Computer Security 
  • SEIS 722  Computer Forensics 

View SEIS Course Catalog.


Entrance Requirements

  1. A bachelor's degree in any discipline from a regionally-accredited educational institution in the U.S. (or international equivalent). 
  2. An overall grade-point-average (GPA) of at least 2.7. (Applicants with a GPA less than 2.7 will be considered for provisional admission with their professional experience factored into the decision.)


Take the Next Step: