Certificate in Cybersecurity

Prepare for a Future in Cybersecurity

cybersecurity image on computer while person is typing
Join the Fast-Growing Cybersecurity Field

Cybercrimes are rapidly advancing, which means there’s a need to fill roles that safeguard data, network security, applications, and computer systems, while defending infrastructures against cyberattacks.

According to the U.S. Bureau of Labor Statistics, there are over 163,000 different jobs in information security, a risk management sector of cybersecurity. The job outlook is predicted to increase by 35% (much faster than average) and there are about 19,500 estimated job openings each year.¹

In the Kenzie program, you’ll prepare for entry-level roles in the high-growth cybersecurity field and related areas.

cybersecurity image on computer while person is typing
  • Illustration of handshake representing partnership
    EC-Council Partnership

    The Cybersecurity program’s curriculum was developed by the International Council of E-commerce Consultants (EC-Council):

    Known as the world’s largest technical cybersecurity certification body

    Creators of globally recognized Certified Ethical Hacker (CEH) standards

    Produces career-focused, tactical, and accredited cybersecurity certifications

  • illustration of merit badge to represent credentials
    4 Credentials

    Upon completing this program, you will earn a Cybersecurity Certificate from Southern New Hampshire University — as well as have the opportunity to become highly credentialed.

    The program helps prepare you to take exams to earn 3 cybersecurity certifications: Network Defense Essentials, Ethical Hacking Essentials, and Digital Forensics Essentials

  • illustration of laptop with lightbulb to represent virtual learning
    iLabs Learning Experiences

    The EC-Council curriculum cultivates practical, hands-on experiences through a feature-rich virtual learning environment. These iLabs challenge you to manage real-world scenarios using cutting-edge tools, such as pre-configured vulnerable websites, hidden victim machines, fully networked environments, forensic cases and files with hard disks, and more.

Certificate in Cybersecurity Quick Facts
  • Length: 9 months
  • Next Start Date: July 2023
  • Tuition: $10,000
  • Hours: 18-20 hours per week
  • Program Location: Online and available to U.S. learners
  • Computer Requirements: View our computer requirements here.
  • Schedules are flexible: Attend class live or watch on-demand recordings. Kickoffs, study halls, and sessions are optional, yet highly encouraged to attend. Hit play on the video to learn more.
  • Programs are delivered in English

Certificate in Cybersecurity: What to Expect

  • Career and Job Search Prep

    The Certificate in Cybersecurity program includes three career-readiness and job-search training courses to help you create tech-focused career artifacts, navigate job searching, develop a self-marketing strategy, learn interview success tactics, and more to get hired. You will also apply course knowledge to career-relevant activities and assignments.


  • Summative Research Project

    In each of the series’ courses, you will complete a scenario-based research project in which you will assume a leadership role, conduct a needs assessment of an industry-leading company, and develop a security proposal. While engaging in these projects, you will develop invaluable research, critical thinking, and problem solving skills.

  • Career Outcomes and Opportunities

    Upon earning the cybersecurity certificate, you may be able to pursue jobs such as: help desk technician, cyber crime analyst, cybersecurity specialist or technician, network administrator, incident and intrusion analyst, IT security specialist, network technical specialist, cyber forensic specialist, intelligence operations specialist, cyber operations technician, and more.

Check out the courses and curriculum below.

Then, let’s get you enrolled!

Apply Now


Enrollment Requirement

Enrollment in the Cybersecurity Certificate Program is required to take the below courses:

CYB101 - Network Security Controls (1 Credit)
Learners will be introduced to Network Security Fundamentals, Identification, Authentication, and Authorization, and Administrative, Physical, and Technical Network Security Controls. Learners will learn through hands-on practical application by implementing Role-Based Access Control in Windows Admin Center (WAC), Password Policies Using Windows Group Policy, host-based firewall functionality using Windows Firewall, network-based IDS functionality using Snort IDS, Proxy Server Using Squid Proxy, and establishing a VPN Connection using OpenVPN.
CYB102 - Cloud, Network, and Device Security (2 Credits)

Learners will be introduced to Virtualization and Cloud Computing, Wireless Network Security, Mobile Device Security, IoT Device Security, and Cryptography and PKI. Learners will learn through hands-on practical application by auditing Docker Host Security Using Docker-Bench-Security Tool, implementing AWS Identity and Access Management, Key Management Services, and Enterprise Mobile Security Using Miradore MDM Solution. They’ll configure Security on Wireless Router, secure IoT Device Communication Using TLS\SSL, and calculate One-way Hashes using HashCalc, MD5 Hashes using MD5 Calculator, and MD5 Hashes using HashMyFiles. Lastly, they’ll Create and Use Self-signed Certificates.

CYB103 - Data Security (2 Credits)

Learners will be introduced to Data Security and Network Traffic Monitoring. Learners will learn through hands-on practical application by performing Disk Encryption using VeraCrypt and File Encryption using Advanced Encryption Package, capturing Network Traffic using Wireshark, analyzing and examining Various Network Packet Headers using Wireshark and Linux using tcpdump, and applying Various Filters in Wireshark. They’ll complete file recovery using EaseUS Data Recovery Wizard and will detect Clear-Text Traffic using Wireshark.

CYB110 - Foundations in Cybersecurity (1 Credit)

Learners will acquire foundational skills and strategies for creating initial drafts of their career artifacts. Through both synchronous and asynchronous guided exercises and practical application of material, learners will enhance their ability to market themselves and establish an initial tech-focused resume, LinkedIn, and cover letter framework.

CYB121 - Ethical Hacking Fundamentals (1 Credit)

Learners will be introduced to the fundamentals, threats, and vulnerability of Information Security and useful countermeasure techniques. Learners will learn through hands-on practical application by footprinting to gather information about a target and extracting usernames, machine names, network resources, sharks, and more from a system or network. They’ll create malware to gain access to and infect a targeted system and will perform various functions to crack and sniff user credentials to system passwords.

CYB122 - Cyber Attacks and Countermeasures (2 Credits)

Learners will be introduced to various Network, Web Application, Wireless, and Mobile Attacks and Countermeasures. Learners will learn through hands-on practical application by applying attack methods and techniques through DDoS, brute force, spoofing, and more. They’ll detect web server and application, wireless, and mobile operating system vulnerabilities by performing various attacks, cracking encryptions, and harvesting credentials.

CYB123 - Cyber Threats, Countermeasures, and Testing (2 Credits)

Learners will be introduced to IoT, OT, and Cloud Computing threats, attacks, and countermeasures along with the fundamentals of penetration testing. Learners will learn through hands-on practical application by capturing and analyzing IoT device traffic.

CYB120 - Exploration in Cybersecurity (1 Credit)

Learners will gain skills to better navigate the landscape of job searching for technical careers, including understanding jargon and building their social capital. Through continued asynchronous and synchronous self-reflection, hands-on exercises and provided tools, learners will explore job descriptions, Career Services support systems, interview frameworks and success strategies, self-promotion techniques, and relevant resources for their job search. Throughout learners will revisit their initial career artifacts and extend these tools by considering their use in their search and developing a plan for their final career artifact, the portfolio.

CYB201 - Computer Forensics Fundamentals (1 Credit)

Learners will be introduced to the fundamentals and investigation process of Computer Forensics, hard disks and file systems, data Acquisition and duplication, and defeating anti-forensics Techniques. Learners will learn through hands-on practical application by performing Hash or HMAC calculations and comparing the hash value files by checking their integrity. They’ll analyze multiple operating system file systems, view the contents of a forensic image file, and recover data from lost and deleted disk partitions.

CYB202 - Operating Systems Forensics (2 Credits)

Learners will be introduced to operating systems forensics for Windows, Linux, and Mac, network forensics, and the investigation of web application attacks. Learners will learn through hands-on practical application by acquiring and collecting volatile and non-volatile information, collecting system, kernel, user account, and system logs information, investigating various network attacks using Wireshark, and identifying and investigating web application attacks using Splunk.

CYB203 - Dark Web and Malware Forensics (2 Credits)

Learners will be introduced to dark web and malware forensics and email crime. Learners will learn through practical application by analyzing RMA dump and examining TOR browser artifacts and performing status analysis and examination of suspicious files and documents, and emails.

CYB130 - Cybersecurity Portfolio Optimization (1 Credit)

Learners will prepare for their approaching job search by revisiting and optimizing their career artifacts and previously established job search strategies. Through segmented guidance and practical, scaled application of tools and tips, learners will begin to map their artifacts to their specific job search and add new, individualized skills to their job search approach. Learners will leverage the synchronous and asynchronous guidance, exercises, and tools to complete this module with a refined self-marketing strategy, a plan for continued optimization of their career artifacts, and an understanding of their next steps to enter their job search with Career Services supports.

Fill out the application & one of our Admission Counselors will be in touch with you soon.

Ready to get started?

Apply Now

Frequently Asked Questions

Do you offer courses in-person, online, or both?

Our courses are offered 100% online only to provide you with flexibility and the ability to self-pace your learning according to your schedule.

Can I work and take this program?

The number of hours you dedicate to the program depends on how efficiently you manage your time and how much time you need to put into your coursework. Your schedule is flexible as you can attend class live or watch on-demand recordings, as well as attend weekly kickoffs, topic sessions, study halls, and Q&A sessions that are not mandatory (although highly recommended). We recognize that many of our learners need a job and income while completing their program. Therefore, this program typically requires 18-20 hours per week of dedication to coursework.

What are the requirements to be accepted and enrolled in the program?

Prospective learners must meet the following criteria:

  • High school diploma or equivalent
  • 18 years or older
  • Fluent in English
  • International learners are unable to enroll in a Kenzie Academy program from Southern New Hampshire University at this time. Please visit the Southern New Hampshire University international student admissions requirements page for more information.
What are the upcoming start dates for the Certificate in Cybersecurity program?

Upcoming Start Dates:

  • April 2023

Apply now to speak with an Admissions Counselor to determine the best time for you to start!

Sources & Citations:

¹Bureau of Labor Statistics, U.S. Department of Labor, Occupational Outlook Handbook, on the internet, at https://www.bls.gov/ooh/computer-and-information-technology/information-security-analysts.htm 

(viewed November 10 2022). Cited projections may not reflect local and/or short-term economic or job conditions and do not guarantee actual job growth.