Online Cyber Network Defense Certificate: Career Outlook

Excel in the growing field of cybersecurity.

Spending on cybercrime prevention is projected to hit an astronomical $6 trillion by 2021, while the number of unfilled cybersecurity jobs will grow to 3.5 million.1 This presents a massive opportunity for those looking for an exciting and lucrative career helping organizations protect their critical systems.

  • 3.5 million unfilled cybersecurity jobs projected by 20211
  • $95,510 median pay for Information Security Analysts (ISA)2
  • 28 percent growth in ISA job postings by 20262

Do your part to combat the ever-increasing onslaught of cybercrime and enter the booming field of cybersecurity with our online Certificate in Cyber Network Defense. Through six three-credit courses, each requiring eight weeks, you'll prepare to take advantage of testing for these professional certifications:

  • CompTIA A+
  • CompTIA Security+
  • CompTIA Network+

Career Opportunities

Graduates from this certificate have gone on to work in positions like these:

  • Information Security Analyst: Provide and implement security solutions that maximize productivity for organizations while following strict privacy policies. Main duties include research, collecting data, and developing secure strategies.
  • Penetration Tester: Use a wide variety of tools to probe and find vulnerabilities in an organization's network. They also seek out and fix passive threats to network integrity, such as poor password policies and user security practices.
  • Network Defense Analyst: Monitor and detect suspicious activity across information systems using a variety of network analyzers and tools. These professionals are responsible for maintaining the integrity of these networks.

 
Request More Information

We'd love to get to know you and hear more about your educational and professional goals. If you'd like to learn more about one of our programs, fill out this form and we'll be in touch:

          I consent to receiving SMS/MMS messages generated by an autodialer from Utica College or its representatives at the mobile number I provided. Consent is not required to receive information. Message & data rates may apply. Send STOP to 35254 to unsubscribe. Send HELP to 35254 for help. Click here for Terms & Conditions and Privacy Policy
          Yes! I'd like to schedule an appointment with an admissions counselor.If this option is not selected, an admission specialist will still contact you at a time of their choosing.
          CAPTCHA
          This question is for testing whether or not you are a human visitor and to prevent automated spam submissions.

          Learning Outcomes

          • Understand the basics of computer hardware and peripherals

          • Apply foundational principles and concepts of information security to real-world problems

          • Analyze, assess and create cyber defense tools and techniques

          • Apply technical, legal and ethical concepts to cybercrime investigations

          • Understand how software is used for cybersecurity applications

          • Perform vulnerability and penetration testing

          Continue Your Education

          When you're ready to advance your education, you can seamlessly transfer equivalent courses from this certificate to the following degree:

          Note that not all of your credit hours may transfer into these degrees. You must obtain permission from the Program Director.

          Beyond the Degree

          We have the tools to help you make your next career move:

          One-on-One Mentors

          Work with your program director and professors for professional mentorship and support.

          Job Search Assistance

          Build your résumé, do mock interviews, and find new opportunities in your area.

          Career Counseling

          Have our experts review your résumé and LinkedIn and learn to stand out from the crowd.

          UC Career Connect

          Register for events, create a visual profile for employers, and apply for jobs and internships through our online portal.

          SOURCES:

          1Morgan, S. (2017, June 06). CSO from IDG, Cybersecurity labor crunch to hit 3.5 million unfilled jobs by 2021. Retrieved December 6, 2018, from https://www.csoonline.com/article/3200024/security/cybersecurity-labor-crunch-to-hit-35-million-unfilled-jobs-by-2021.html
          2Bureau of Labor Statistics, U.S. Department of Labor, Occupational Outlook Handbook, Information Security Analysts, retrieved on December 6, 2018 from https://www.bls.gov/ooh/computer-and-information-technology/information-security-analysts.htm