Gain a practical understanding of the principles of data protection, cybersecurity, and computer forensics with a graduate certificate in information assurance at University of Maryland Global Campus. We've developed the information assurance curriculum in conjunction with top employers, meaning you'll gain real-world experience through interactions with actual organizations and learn job-relevant skills from case studies of real information assurance crises. Your courses feature topics in network and internet security, intrusion detection and protection, cryptology and data protection, and computer forensics.
UMGC was named a National Center of Academic Excellence in Information Assurance and Cyber Defense Education by the National Security Agency and Department of Homeland Security.
These requirements are for students who enroll in the 2020–2021 academic year. For prior year academic requirements, visit our catalog archive.
About the Information Assurance Graduate Certificate
What You'll Learn
Through your coursework, you will learn how to
- Secure information using symmetric and asymmetric key techniques (including the Advanced Encryption Standard and RSA public key cryptography) and message integrity techniques
- Protect networks using risk analysis, defense models, security policy development, authentication and authorization controls, firewalls, packet filtering, virtual private networks (VPNs), and wireless network security
- Respond to attacks with damage assessments, data forensics, data mining, attack tracing, and system recovery processes for continuity of operation
- Identify system vulnerabilities and attack patterns and solve problems with intrusion detection tactics
Coursework Examples
In past projects, students have had the opportunity to
- Conduct laboratory simulations of real events, using the same tools and techniques as industry and government, including
- Information risk analysis
- Network packet analysis
- Forensics tools for evidence collection and preservation
- Access control techniques
- Protocol analyzers
- Intrusion detection systems
- Intrusion prevention systems
- Networking mapping tools
- Encryption/decryption tools
- Vulnerability assessments
Information Assurance Graduate Certificate Requirements
Our curriculum is designed with input from employers, industry experts, and scholars. You'll learn theories combined with real-world applications and practical skills you can apply on the job right away.
Required Courses
Total Credits Required: 15
- UCSP 615
(to be taken within the first 6 credits of study) - INFA 610
(must be taken as one of the first two credit-bearing courses in the program) - INFA 620
- INFA 630
- INFA 640
- INFA 650
Overall Certificate Requirements
Review the overall graduate certificate requirements on the certificates overview webpage.
Career Preparation
This program is designed to help prepare you for work in network and Internet security, intrusion detection and prevention, and cryptology.
Experience Recommended for Success in the Program
This program is appropriate for midcareer professionals or career changers. We recommend a background in computing and programming. We recommend UCSP 605 if you'd like to improve your graduate writing skills.
Student Clubs and Organizations
Type: Student organization
Available To: Undergraduate and Graduate
The Cyber Competition Team represents UMGC at various cybersecurity events and highly competitive tournaments nationwide. Students hone their cybersecurity skills, learn to work effectively as a team, and network with other students, cyber professionals, and prospective employers.
About the Faculty
Our world-class faculty members combine academic credentials with a wealth of experience in the field.
Faculty members in this program hold or have recently held positions including
- Chief information security officer
- Cryptologic manager
- Deputy chief of cyber security operations
- Director of server operations
- Team lead for cyber threat analysis
- Technical director of security engineering and testing
Our faculty work or have worked at organizations including
- Defense Information Systems Agency
- General Dynamics
- Johns Hopkins University Applied Physics Laboratory
- Lucent Technologies
- National Security Agency
- Science Applications International Corporation
- Transportation Security Agency
- U.S. Department of Defense
- U.S. Department of Homeland Security
- Verizon