Cybersecurity, Post-Baccalaureate Certificate
Gain the skills and preparation you need to succeed as a competitive professional in the field of cybersecurity with a graduate certificate in cybersecurity from ÌìÃÀ´«Ã½ÖÆƬ³§'s School for Professional Studies.
As part of the School for Professional Studies, this nine-credit, fully online program offers technology-driven professionals like you a flexible option to meet your personal career goals. If you have obtained an undergraduate degree or higher, you may pursue a stand-alone certificate. All courses are offered in eight-week terms through SLU Online, making advanced education more accessible for working professionals.Ìý
Faculty
As a student in the School for Professional Studies at ÌìÃÀ´«Ã½ÖÆƬ³§, you’ll learn from exceptional faculty who are leading experts in their fields. They bring real-world knowledge to the classroom and are dedicated to your professional success. Learn more about the SPS faculty.
You could be halfway to a master’s degree."
Make yourself more marketable by diversifying your expertise and earning a master’s degree. All coursework completed successfully toward a post-baccalaureate certificate may count toward a School for Professional Studies master's degree.
Master of Professional Studies Master of Science in Cybersecurity
Careers
SLU's post-baccalaureate certificate in cybersecurity prepares you to manage and lead cyber teams and programs. Graduates of the cybersecurity program have the foundation necessary to succeed as network and computer systems administrators, government cybersecurity analysts, computer systems analysts, information security analysts, and computer and information systems managers.
Tuition
Tuition | Cost Per Credit |
---|---|
Online Graduate Degrees and Post-Baccalaureate Certificates | $790 |
Additional charges may apply. Other resources are listed below:
Information on Tuition and Fees
Scholarships and Financial Aid
For priority consideration for graduate assistantship, apply by Feb. 1.
For more information, visit the Office of Student Financial Services.
- Graduates will be able to construct and implement networks and data management systems that protect intellectual property using cybersecurity principles.
- Graduates will be able to apply information security principles to analyze, detect and mitigate vulnerabilities and intrusions.
Admission Requirements
- Completed application​
- Undergraduate degree (most successful applicants have an undergraduate grade point average of 3.0 or better)
- Official transcript from a degree-granting institution
- Statement of purpose (about 500 words)
- Resume or curriculum vitae
- External reference recommendations (encouraged but not required)
UponÌýadmission, a new student must successfully complete a virtual meeting with their academic coach to enroll in first-term coursework.
Requirements for International Students
Along with the general admission requirements above, the following must be provided by prospective international students:
- Demonstration of English Language Proficiency. Some examples of demonstrated English language proficiency include minimum score requirements for the following standardized tests:
- Paper-based TOEFL: 550
- Internet-based TOEFL: 80
- IELTS: 6.5
- PTE: 54
- Academic records, in English translation, for post-secondary studies outside the United States. These must include the courses taken and/or lectures attended, practical laboratory work, the maximum and minimum grades attainable, the grades earned or the results of all end-of-term examinations, and any honors or degrees received. WES and ECE transcripts are accepted.
Program RequirementsÌý
Code | Title | Credits |
---|---|---|
°ä³Ûµþ¸éÌý5000 | Cybersecurity Principles | 3 |
°ä³Ûµþ¸éÌý5010 | Networking Concepts | 3 |
°ä³Ûµþ¸éÌý5030 | Cyber Threats and Defense | 3 |
Total Credits | 9 |
Continuation Standards
Students must maintain a cumulative grade point average (GPA) of 3.00 in all graduate/professional courses.
Roadmaps are recommended semester-by-semester plans of study for programs and assume full-time enrollmentÌýunless otherwise noted. Ìý
Courses and milestones designated as critical (marked with !) must be completed in the semester listed to ensure a timely graduation. Transfer credit may change the roadmap.
This roadmap should not be used in the place of regular academic advising appointments. All students are encouraged to meet with their advisor/mentor each semester. Requirements, course availability and sequencing are subject to change.
Year One | ||
---|---|---|
Fall | Credits | |
Fall 1 | Ìý | |
°ä³Ûµþ¸éÌý5000 | Cybersecurity Principles | 3 |
Fall 2 | Ìý | |
°ä³Ûµþ¸éÌý5010 | Networking Concepts | 3 |
Ìý | Credits | 6 |
Spring | ||
Spring 1 | Ìý | |
°ä³Ûµþ¸éÌý5030 | Cyber Threats and Defense | 3 |
Ìý | Credits | 3 |
Ìý | Total Credits | 9 |