Certificate in Cybersecurity

Prepare for a Future in Cybersecurity

Check out the courses and details below.

Then, let’s get you enrolled!

Apply Now
cybersecurity image on computer while person is typing
Join the Fast-Growing Cybersecurity Field

Cybercrimes are rapidly advancing, which means there’s a need to fill roles that safeguard data, network security, applications, and computer systems, while defending infrastructures against cyberattacks.

According to the U.S. Bureau of Labor Statistics, there are over 163,000 different jobs in information security, a risk management sector of cybersecurity. The job outlook is predicted to increase by 35% (much faster than average) and there are about 19,500 estimated job openings each year.¹

In the Kenzie program, you’ll prepare for entry-level roles in the high-growth cybersecurity field and related areas.

cybersecurity image on computer while person is typing
  • Illustration of handshake representing partnership
    EC-Council Partnership

    The Cybersecurity program’s curriculum was developed by the International Council of E-commerce Consultants (EC-Council):

    Known as the world’s largest technical cybersecurity certification body

    Creators of globally recognized Certified Ethical Hacker (CEH) standards

    Produces career-focused, tactical, and accredited cybersecurity certifications

  • illustration of merit badge to represent credentials
    4 Credentials

    Upon completing this program, you will earn a Cybersecurity Certificate from Southern New Hampshire University — as well as have the opportunity to become highly credentialed.

    The program helps prepare you to take exams to earn 3 cybersecurity certifications: Network Defense Essentials, Ethical Hacking Essentials, and Digital Forensics Essentials

  • illustration of laptop with lightbulb to represent virtual learning
    iLabs Learning Experiences

    The EC-Council curriculum cultivates practical, hands-on experiences through a feature-rich virtual learning environment. These iLabs challenge you to manage real-world scenarios using cutting-edge tools, such as pre-configured vulnerable websites, hidden victim machines, fully networked environments, forensic cases and files with hard disks, and more.

Certificate in Cybersecurity Quick Facts
  • Length: 9 months
  • Next Start Date: October 2023
  • Tuition: $10,000
  • Hours: 18-20 hours per week
  • Program Location: Online and available to U.S. students
  • Computer Requirements: View our computer requirements here.
  • Schedules are flexible: Attend class live or watch on-demand recordings. Kickoffs, study halls, and sessions are optional, yet highly encouraged to attend. Hit play on the video to learn more.
  • Programs are delivered in English



Certificate in Cybersecurity: What to Expect

  • Career and Job Search Prep

    The Certificate in Cybersecurity program offers three career-readiness and job-search training courses to help you create tech-focused career artifacts, navigate job searching, develop a self-marketing strategy, learn interview success tactics, and more to get hired. You will also apply course knowledge to career-relevant activities and assignments.


  • Summative Research Project

    During each term, you will complete a scenario-based research project in which you will assume a leadership role, conduct a needs assessment of an industry-leading company, and develop a security proposal. While engaging in these projects, you will develop invaluable research, critical thinking, and problem-solving skills.

  • Career Outcomes and Opportunities

    Upon earning the cybersecurity certificate, you may be able to pursue jobs such as: help desk technician, cyber crime analyst, cybersecurity specialist or technician, network administrator, incident and intrusion analyst, IT security specialist, network technical specialist, cyber forensic specialist, intelligence operations specialist, cyber operations technician, and more.

Enrollment Requirement

Enrollment in the Cybersecurity Certificate Program is required to take the below courses:

CYB101 - Network Security Controls (2 Credits)
Students will be introduced to Network Security Fundamentals, Identification, Authentication, and Authorization, and Administrative, Physical, and Technical Network Security Controls. Students will learn through hands-on practical application by implementing Role-Based Access Control in Windows Admin Center (WAC), Password Policies Using Windows Group Policy, host-based firewall functionality using Windows Firewall, network-based IDS functionality using Snort IDS, Proxy Server Using Squid Proxy, and establishing a VPN Connection using OpenVPN.
CYB102 - Cloud, Network, and Device Security (2 Credits)

Students will be introduced to Virtualization and Cloud Computing, Wireless Network Security, Mobile Device Security, IoT Device Security, and Cryptography and PKI. Students will learn through hands-on practical application by auditing Docker Host Security Using Docker-Bench-Security Tool, implementing AWS Identity and Access Management, Key Management Services, and Enterprise Mobile Security Using Miradore MDM Solution. They’ll configure Security on Wireless Router, secure IoT Device Communication Using TLS\SSL, and calculate One-way Hashes using HashCalc, MD5 Hashes using MD5 Calculator, and MD5 Hashes using HashMyFiles. Lastly, they’ll Create and Use Self-signed Certificates.

CYB103 - Data Security (2 Credits)

Students will be introduced to Data Security and Network Traffic Monitoring. Students will learn through hands-on practical application by performing Disk Encryption using VeraCrypt and File Encryption using Advanced Encryption Package, capturing Network Traffic using Wireshark, analyzing and examining Various Network Packet Headers using Wireshark and Linux using tcpdump, and applying Various Filters in Wireshark. They’ll complete file recovery using EaseUS Data Recovery Wizard and will detect Clear-Text Traffic using Wireshark.

CYB121 - Ethical Hacking Fundamentals (2 Credits)

Students will be introduced to the fundamentals, threats, and vulnerability of Information Security and useful countermeasure techniques. Students will learn through hands-on practical application by footprinting to gather information about a target and extracting usernames, machine names, network resources, sharks, and more from a system or network. They’ll create malware to gain access to and infect a targeted system and will perform various functions to crack and sniff user credentials to system passwords.

CYB122 - Cyber Attacks and Countermeasures (2 Credits)

Students will be introduced to various Network, Web Application, Wireless, and Mobile Attacks and Countermeasures. Students will learn through hands-on practical application by applying attack methods and techniques through DDoS, brute force, spoofing, and more. They’ll detect web server and application, wireless, and mobile operating system vulnerabilities by performing various attacks, cracking encryptions, and harvesting credentials.

CYB123 - Cyber Threats, Countermeasures, and Testing (2 Credits)

Students will be introduced to IoT, OT, and Cloud Computing threats, attacks, and countermeasures along with the fundamentals of penetration testing. Students will learn through hands-on practical application by capturing and analyzing IoT device traffic.

CYB201 - Computer Forensics Fundamentals (2 Credits)

Students will be introduced to the fundamentals and investigation process of Computer Forensics, hard disks and file systems, data Acquisition and duplication, and defeating anti-forensics Techniques. Students will learn through hands-on practical application by performing Hash or HMAC calculations and comparing the hash value files by checking their integrity. They’ll analyze multiple operating system file systems, view the contents of a forensic image file, and recover data from lost and deleted disk partitions.

CYB202 - Operating Systems Forensics (2 Credits)

Students will be introduced to operating systems forensics for Windows, Linux, and Mac, network forensics, and the investigation of web application attacks. Students will learn through hands-on practical application by acquiring and collecting volatile and non-volatile information, collecting system, kernel, user account, and system logs information, investigating various network attacks using Wireshark, and identifying and investigating web application attacks using Splunk.

CYB203 - Dark Web and Malware Forensics (2 Credits)

Students will be introduced to dark web and malware forensics and email crime. Students will learn through practical application by analyzing RMA dump and examining TOR browser artifacts and performing status analysis and examination of suspicious files and documents, and emails.

Decide if Tech is for You


Frequently Asked Questions
Do you offer courses in-person, online, or both?

Our courses are offered 100% online only to provide you with flexibility and the ability to self-pace your learning according to your schedule.

Can I work and take this program?

The number of hours you dedicate to the program depends on how efficiently you manage your time and how much time you need to put into your coursework. Your schedule is flexible as you can attend class live or watch on-demand recordings, as well as attend weekly kickoffs, topic sessions, study halls, and Q&A sessions that are not mandatory (although highly recommended). We recognize that many of our students need a job and income while completing their program. Therefore, this program typically requires 18-20 hours per week of dedication to coursework.

What are the requirements to be accepted and enrolled in the program?

Prospective students must meet the following criteria:

  • High school diploma or equivalent
  • 18 years or older
  • Fluent in English
  • International students are unable to enroll in a Kenzie Academy program from Southern New Hampshire University at this time. Please visit the Southern New Hampshire University international student admissions requirements page for more information.
What are the upcoming start dates for the Certificate in Cybersecurity program?

Upcoming Start Dates:

  • July 2023

Apply now to speak with an Admissions Counselor to determine the best time for you to start!

Sources & Citations:

¹Bureau of Labor Statistics, U.S. Department of Labor, Occupational Outlook Handbook, on the internet, at https://www.bls.gov/ooh/computer-and-information-technology/information-security-analysts.htm 

(viewed November 10 2022). Cited projections may not reflect local and/or short-term economic or job conditions and do not guarantee actual job growth.