Cybersecurity Certificate Online
This cybersecurity certificate program for beginners provides essential security concepts and fundamentals with online courses focused on data integrity and intellectual property protection.
Franklin University has partnered with Coursera Campus to provide cutting-edge certificates to learners seeking to advance. Courses are open to all learners. No application required.
Included in your subscription
Get unlimited access to over 7,000 offerings found on the Coursera website – including guided projects, specializations and professional certificates offered by hundreds of leading universities and companies. You also get access to all 39 professional certificates found in the Franklin Marketplace.
LEARN MOREWhat You Will Learn
- Learn about the need for cybersecurity and how cyberattacks disrupt business and industry
- Study common vulnerabilities, including malicious attacks, threats, viruses and phishing
- Understand information security best practices, such as data protection security models, network access controls and intrusion detection and prevention practices
- Practice assessing security, monitoring and securing environments and responding to security incidents
About the Cybersecurity Professional Certificate
The Cybersecurity Professional Certificate is designed for those with a desire to enter the fast-growing and ever-changing world of information and data security. If you have a curious nature, a bold spirit and a drive to learn how to defend against cyber threats, this cybersecurity certificate program is for you.
The courses that comprise the Cybersecurity Professional Certificate will introduce you to a wide variety of cybersecurity-related topics, ranging from systems protection to information infrastructure to mitigation strategies.
Through your certificate course studies, you'll learn and practice the in-demand skills used by cybersecurity professionals, including monitoring, identifying and respoinding to security threats, performing risk assessments, uncovering network vulnerabilities, and assisting with mitigating and responding to data breaches. Through hands-on projects, you'll also gain practical experience in threat intelligence and incident investigation.
Plus, you'll be introduced the three pillars of cybersecurity -- confidentiality, integrity and availability -- and gain an understanding of the important role the CIA triad plays in security planning and compliance.
Jump-start your cybersecurity career by enrolling in this Cybersecurity Professional Certificate program and prepare yourself for an exciting career as an information security analyst, penetration testor, cryptographer or data recovery specialist.
Required Cybersecurity Certificate Courses
BEGINNER | Information Technology | Self-paced | 15 hours
Welcome to Access Controls! The Access Controls Course provides information pertaining to specify what users are permitted to do, the resources they are allowed to access, and what operations they are able to perform on a system. Access Controls help managers limit and monitor systems use at a user level or group membership. You will understand the different access control systems and how they should be implemented to protect the system and data using the different levels of confidentiality, integrity, and availability. The Access Controls course provides information pertaining to specifying what users are permitted to do, the resources they are allowed to access, and what operations they are able to perform on a system. Access Controls help managers limit and monitor systems use at a user level, and is usually predefined based on authority level or group membership. You will understand the different access control systems and how they should be implemented to protect the system and data using the different levels of confidentiality, integrity, and availability. Objectives 1. Describe how to implement Authentication mechanisms 2. Identify and operate internetwork trust architectures 3. Describe the process of administering identity management life cycle 4. Implement the different types of access controls (Subject/Object based)BEGINNER | Information Technology | Self-paced | 16 hours
Security operations and administration is the task of identifying an organization's information assets and the documentation needed for policy implementation, standards, procedures, and guidelines to ensure confidentiality, integrity, and availability. You will understand the process necessary for working with management and information owners, custodians, and users so that proper data classifications are defined. This will ensure the proper handling of all hard copy and electronic information. The Security operations and Administration course addresses basic security concepts and the application of those concepts in the day to day operation and administration of enterprise computer systems and the information that they host.Ethical considerations in general, and the (ISC)2 Code of Ethics in particular, provide the backdrop for any discussion of information security and SSCP candidates will be tested on both. Information security professionals often find themselves in positions of trust and must be beyond reproach in every way.Several core principles of information security stand above all others and this domain covers these principles in some depth. It can be said that the CIA triad of confidentiality, integrity and availability forms the basis for almost everything that we do in information security and the SSCP candidate must not only fully understand these principles but be able to apply them in all situations. additional security concepts covered in this domain include privacy, least privilege, non-repudiation and the separation of duties. Course Objectives 1. Define Code of Ethics 2. Describe the security concepts 3. Document and operate security controls 4. Describe the asset management process 5. Implement compliance controls 6. Assess compliance controls 7. Describe the change management process 8. Contribute to the security awareness training program 9. Contribute to physical security operationsBEGINNER | Information Technology | Self-paced | 23 hours
Risk Identification, Monitoring, and Analysis: In the Risk Identification, Monitoring, and Analysis session, you will learn how to identify, measure, and control losses associated with adverse events. You will review, analyze, select, and evaluate safeguards for mitigating risk.You will learn processes for collecting information, providing methods of identifying security events, assigning priority levels, taking the appropriate actions, and reporting the findings to the correct individuals. After collection of the details from monitoring, we can analyze to determine if the system is being operated in accordance with accepted industry practices, and in compliance with organization policies and procedures. Incident Response and Recovery: In the Incident Response and Recovery Session, you will gain an understanding of how to handle incidents using consistent, applied approaches in order to resolve. Once an incident is identified, action will be necessary in order to resolve. We will examine processes such as damage recovery, data integrity and preservation, and the collection, handling, reporting, and prevention. You will be introduced to the Business Continuity Plan (BCP) and Disaster Recovery Plan (DRP) concepts and how they can be utilized in order to mitigate damages, recover business operations, and avoid critical business interruption. Through the use of the DRP, you will understand the procedures for emergency response and post-disaster recovery. Course Objectives 1. Describe the risk management process 2. Perform security assessment activities 3. Describe processes for operating and maintaining monitoring systems 4. Identify events of interest 5. Describe the various source systems 6. Interpret reporting findings from monitoring results 7. Describe the incident handling process 8. Contribute to the incident handling process based upon role within the organization 9. Describe the supporting role in forensics investigation processes 10. Describe the supporting role in the business continuity planning process 11. Describe the supporting role in the disaster recovery planning processBEGINNER | Information Technology | Self-paced | 17 hours
Welcome to Systems and Application Security Course! In the Systems and Application Security Course, you will gain an understanding of computer code that can be described as harmful or malicious. Both technical and non-technical attacks will be discussed. You will learn how an organization can protect itself from these attacks. You will learn concepts in endpoint device security, cloud infrastructure security, securing big data systems, and securing virtual environments. Objectives 1. Identify malicious code activity 2. Describe malicious code and the various countermeasures 3. Describe the processes for operating endpoint device security 4. Define mobile device management processes 5. Describe the process for configuring cloud security 6. Explain the process for securing big data systems 7. Summarize the process for securing virtual environmentsComplete This Certificate. Get College Credit.
You know that skill-specific courses will open the door to specialized jobs, but did you know that they will also move you closer to a degree at Franklin University?
The University has evaluated hundreds of certifications for industry-recognized proficiencies and awards credit that equates to specific Franklin courses, as well as technical- or elective-credit requirements. See how much time and money you'll save toward your degree by building on prior learning credit.
Browse & Filter
Frequently Asked Questions
When you enroll in this self-paced certificate program, you decide how quickly you want to complete each of the courses in the specialization. To access the courses, you pay a small monthly cost of $35, so the total cost of your Professional Certificate depends on you. Plus, you can take a break or cancel your subscription anytime.
It takes about 4-5 months to finish all the courses and hands-on projects to earn your certificate.
No prior experienced is needed for this beginner-level series. Enroll now.
Kick-start your cybersecurity career and show prospective employers your readiness to support and enhance information security.
No. Courses offered through the Marketplace are for all learners. There is no application or admission process.
Please submit your certificate to plc@franklin.edu for review and processing. After your official evaluation has been completed, please review it to ensure that all eligible credits have been applied.
You can submit documentation before or after you apply to Franklin.