Cybersecurity

Online Undergraduate Certificate in Cybersecurity

Save @ AMU

$0 Application Fee
$0 Transfer Credit Evaluation
$0 Textbooks & eBooks

72%Have Graduated with No APUS-incurred Student Loan Debt2

About This Program

Cybersecurity certifications and advanced knowledge are crucial in the never-ending challenge of organizational security. The online undergraduate certificate in cybersecurity from American Military University (AMU) enables you to:

  • Understand digital forensics tools, techniques, and methods, as well as cybercrime and cyber war
  • Deepen your understanding of the social and legal impacts of cyber terrorism, cyberstalking, and cyber bullying
  • Develop more familiarity with regulatory compliance standards, including the Children’s Online Privacy Protection Act (COPPA) and Sarbanes-Oxley

This certificate is a useful step in cybersecurity certifications for beginners, especially if you want to expand your cybersecurity knowledge without committing to a degree program.

NOTE: Completion of this program does not award any professional certifications, but may be helpful in preparing to earn such certifications.

What You Will Do

  1. Study the processes and goals of cyber forensics investigations
  2. Learn the federal and state laws and legal concepts that affect how governments and organizations think about information security
  3. Understand the importance of search warrants and chain of custody in a forensic investigation
  4. Grow your knowledge of the cybersecurity field and its regulatory standards and compliances
  5. Gain the foundational knowledge and learn the technologies needed to detect, investigate, and prevent computer-related crimes

Program at a Glance

Number of Credits
18
Cost Per Credit
$350 | $250*
$315**
Courses Start Monthly
Online
  • Want to Learn More?

    Contact student support if you're a current student and need assistance.

    Step One: Introduce Yourself
    Validation message here
    Validation message here
    Validation message here
    Validation message here
    Validation message here
    Validation message here

Program Requirements Printable Catalog Version

Must take all courses for this section.

Course ID: 4398

|
This course examines information security issues and the law. The rapid growth of technology has given rise to legal issues surrounding technology. Information security is the practice of protecting information to ensure the goals of confidentiality, integrity and availability are met. Information security makes sure that accurate information is available to authorized individuals when it is needed. When governments, private organizations, and individuals do a poor job of protecting the information entrusted to them, legislatures respond with new laws. The course will examine key conflicts involving technology and the legal system to include: privacy issues, civil, criminal, and administrative law, Children’s Online Privacy Protection Act (COPPA), Sarbanes Oxley, and information security governance. This course examines current literature on such topics.
Registration Dates Course Dates Session Weeks
07/29/24 - 01/03/25 01/06/25 - 03/02/25 Winter 2025 Session B 8 Week session
08/26/24 - 01/31/25 02/03/25 - 03/30/25 Winter 2025 Session I 8 Week session
09/30/24 - 02/28/25 03/03/25 - 04/27/25 Winter 2025 Session D 8 Week session
10/28/24 - 04/04/25 04/07/25 - 06/01/25 Spring 2025 Session B 8 Week session
11/28/24 - 05/02/25 05/05/25 - 06/29/25 Spring 2025 Session I 8 Week session

Course ID: 4006

|
The explosion in the use of the Internet and the ensuing growth in cybercrime have given rise to the field of computer forensics (also called digital forensics). Digital forensics is used to assemble digital evidence to prosecute cybercrime, analyze intrusions, mitigate risk, and for data recovery. This course examines the theory, best practices, and methodologies to conduct computer forensics investigations; it includes the ethical issues, data presentation, and chain-of-evidence procedures. It also appraises current tools and technologies to analyze, acquire, and organize digital evidence. This course maps to the general objectives of the International Association of Computer Investigative Specialists (IACIS) certification. Requires CITRIX CLIENT SOFTWARE INSTALLATION FOR ONLINE VIRTUAL LABS accessibility.
Registration Dates Course Dates Session Weeks
07/29/24 - 01/03/25 01/06/25 - 03/02/25 Winter 2025 Session B 8 Week session
08/26/24 - 01/31/25 02/03/25 - 03/30/25 Winter 2025 Session I 8 Week session
09/30/24 - 02/28/25 03/03/25 - 04/27/25 Winter 2025 Session D 8 Week session
10/28/24 - 04/04/25 04/07/25 - 06/01/25 Spring 2025 Session B 8 Week session
11/28/24 - 05/02/25 05/05/25 - 06/29/25 Spring 2025 Session I 8 Week session

Course ID: 4009

|
The rapid change in technology and the exponential growth in the use of the Internet have resulted in an increase in the number of computer and technology related crimes. This course is designed to provide students with the foundational knowledge and technologies needed to detect, investigate, and prevent computer related crimes. Topics to be covered include: cybercrime classification (hacking, denial of service attacks, cyberstalking, cyberbullying, virus dissemination, identity theft, electronic funds transfers, phishing, spoofing, Internet fraud, access device fraud and salami attacks), vulnerability of computer systems and computer applications, computer intrusions and attacks, the impact of cybercrime (social, economic, and legal), investigation of digital evidence, computer forensics, and the prevention of cybercrime.
Registration Dates Course Dates Session Weeks
07/29/24 - 01/03/25 01/06/25 - 03/02/25 Winter 2025 Session B 8 Week session
08/26/24 - 01/31/25 02/03/25 - 03/30/25 Winter 2025 Session I 8 Week session
09/30/24 - 02/28/25 03/03/25 - 04/27/25 Winter 2025 Session D 8 Week session
10/28/24 - 04/04/25 04/07/25 - 06/01/25 Spring 2025 Session B 8 Week session
11/28/24 - 05/02/25 05/05/25 - 06/29/25 Spring 2025 Session I 8 Week session

Course ID: 4410

|
This course examines the practices for assuring information security. The various roles and functions within the Cybersecurity practice will be combined and leveraged to produce a secure organization. Case studies will be used to examine theories and practices drawn from real world situations. The numerous pitfalls of Cybersecurity will be presented with everyday practices of securing companies resources from attack. This course will examine the frameworks, roles, and competencies involved with information security. The fundamentals of Cybersecurity will be examined to include: network and security concepts, attacker techniques, data security, system and applications security and incident response techniques. Current literature will be examined on such topics.
Registration Dates Course Dates Session Weeks
07/29/24 - 01/03/25 01/06/25 - 03/02/25 Winter 2025 Session B 8 Week session
08/26/24 - 01/31/25 02/03/25 - 03/30/25 Winter 2025 Session I 8 Week session
09/30/24 - 02/28/25 03/03/25 - 04/27/25 Winter 2025 Session D 8 Week session
10/28/24 - 04/04/25 04/07/25 - 06/01/25 Spring 2025 Session B 8 Week session
11/28/24 - 05/02/25 05/05/25 - 06/29/25 Spring 2025 Session I 8 Week session

Course ID: 4413

|
The increase in the use of the Internet and ensuing growth in cybercrime have given rise to the field of digital forensics. Students will be introduced to advanced techniques in computer investigation and analysis with interest in generating potential legal evidence. This course examines computer related crime and abuse cases in order to gather all necessary information and evidence to support prosecution in a court of law. Collection of evidence, investigating information hiding, and intrusion response techniques will be explored. This course will examine network intrusions, network traffic, web attacks, DoS attacks and corporate espionage. Current literature will be examined on such topics.
Registration Dates Course Dates Session Weeks
07/29/24 - 01/03/25 01/06/25 - 03/02/25 Winter 2025 Session B 8 Week session
08/26/24 - 01/31/25 02/03/25 - 03/30/25 Winter 2025 Session I 8 Week session
09/30/24 - 02/28/25 03/03/25 - 04/27/25 Winter 2025 Session D 8 Week session
10/28/24 - 04/04/25 04/07/25 - 06/01/25 Spring 2025 Session B 8 Week session
11/28/24 - 05/02/25 05/05/25 - 06/29/25 Spring 2025 Session I 8 Week session

Course ID: 5169

|
This course examines how laws have changed to account for the expanded realm of crimes in the digital age. Students will learn about topics such as online identity theft, sexual harassment, intellectual property rights violations, and plagiarism. In addition, students will learn how stalkers can access the digital data of victims, gain access to highly confidential medical and financial information, and sabotage their victims' reputations. This course examines current literature on topics such as the Health Insurance Portability and Accountability Act (HIPAA), the Family Educational Rights and Privacy Act (FERPA), the Children’s Online Privacy Protection Act (COPPA), the Sarbanes-Oxley Act, and other legislation impacting legal disputes.
Registration Dates Course Dates Session Weeks
07/29/24 - 01/03/25 01/06/25 - 03/02/25 Winter 2025 Session B 8 Week session
08/26/24 - 01/31/25 02/03/25 - 03/30/25 Winter 2025 Session I 8 Week session
09/30/24 - 02/28/25 03/03/25 - 04/27/25 Winter 2025 Session D 8 Week session
10/28/24 - 04/04/25 04/07/25 - 06/01/25 Spring 2025 Session B 8 Week session
11/28/24 - 05/02/25 05/05/25 - 06/29/25 Spring 2025 Session I 8 Week session

Courses Start Monthly

Next Courses Start Jan 6
Register by Jan 3

Admission Requirements

  • All AMU undergraduate programs require a minimum of a high school diploma or equivalent (i.e., GED).
  • Please read all undergraduate admission requirements before applying to this program and be prepared to submit the required documentation.
  • There is no fee to complete the AMU admission application for this program. View steps to apply.

Materials Cost

Software and/or lab equipment required for some courses in this program must be purchased at the student’s expense, and are not included in the university book grant. Expenses may depend on courses chosen for electives and concentration requirements. Estimated costs can be found at https://apus.libguides.com/bookstore

 

Need Help?

Selecting the right program to meet your educational goals is a key step in ensuring a successful outcome. If you are unsure of which program to choose, or need more information, please contact an AMU admissions coach at 877-755-2787 or [email protected].

Quality Education Should Be Affordable

So you can focus on the opportunities ahead, without the financial burden of more expensive schools who are not as invested in your success. Learn more about paying for school.

Consumer Information

Disclosures

Maryland Residents learn more about costs, completion rates, median debt, and more.

2Alumni Graduated with No APUS-incurred Student Loan Debt As of December 31, 2021

Includes alumni who graduated with an associate, bachelor's, or master's degree from APUS. Student loan debt is defined as student loans and private education loans used for tuition, fees, living expenses, and book costs associated with courses taken at APUS. Many APUS students receive military tuition assistance and veterans education benefits, which are not student loan debt.

1The University reserves the right to accept or deny credits according to policies outlined on our University website. Please see the University's transfer credit policy webpage for complete information.

*Cost Per Credit Hour

The Preferred Military Rate is $250 per credit hour for undergraduate and  master's-level courses. This rate is available to all U.S. active-duty servicemembers, National Guard members, Reservists, and military families, including parents, spouses, legal partners, siblings, and dependents.

See all military student benefits.

Cost of Attendance

Learn more about AMU’s cost components and full cost of attendance