As cyberattacks increase, cybersecurity is experiencing incredible growth. Utica College's online certificate in Cybersecurity Technologies gives you the tools and techniques to kick off your career as a cybersecurity professional.
Online Cybersecurity Technologies Certificate: Career Outlook
Jump-start your career safeguarding data in this fast-growing field.
- Nearly 3,500% ($3.5 billion to $120 billion) market growth from 2004 to 20171
- $20 billion spending on cybersecurity by the U.S. government in 20171
- 3.5 million unfilled cybersecurity jobs projected by 20212
- $95,510 average salary for information security professionals3
- 28% employment growth projected from 2016 to 2026, much faster than the national average3
From exploring the hardware and software used to fight cybercrime, to understanding the complex world of information assurance and risk management, you'll complete this program one step closer to a career safeguarding networks, data, and important assets.
In just 12 months, this certificate will support your preparation for CompTIA A+ and CompTIA Security+ certifications. Graduate ready for entry-level positions in cybersecurity and take your career further.
Students are expected to complete one course every eight weeks.
Graduates from this certificate have gone on to work in positions like these:
- Information Security Analyst: Provide and implement security solutions that maximize productivity for organizations while following strict privacy policies. Main duties include research, collecting data, and developing security strategies.
- Compliance Manager: Apply your cybersecurity expertise to plan, direct, or coordinate an organization's activities to ensure compliance with ethical and regulatory standards.
- Security Manager: Harness your cybersecurity expertise to direct your organization's security functions, including the safety of its data and assets.
Request More Information
We'd love to get to know you and hear more about your educational and professional goals. If you'd like to learn more about one of our programs, fill out this form and we'll be in touch:
Understand the basics of computer hardware, peripherals and system software, and their relationship to cybersecurity and computer forensics
Analyze and assess how cyber technologies, cybersecurity, and computer forensics are involved in the fields of criminal justice, business, industry, and critical infrastructure
Examine the legal, social, technical, and ethical trade-offs and relationships involved in the cybersecurity and computer forensics disciplines
Recognize the interrelationship between cybercrime and fraud and understand the techniques used to investigate and mitigate cyber fraud
Create cybersecurity policies that address legal, compliance, and regulatory requirements
Continue Your Education
When you're ready to advance your education, you can seamlessly transfer equivalent courses from this certificate into this degree:
Note that not all of your credit hours may transfer into this degree. You must obtain permission from the program director.
Beyond the Degree
We have the tools to help you make your next career move:
Work with your program director and professors for professional mentorship and support.
Job Search Assistance
Build your résumé, do mock interviews, and find new opportunities in your area.
Have our experts review your résumé and LinkedIn and learn to stand out from the crowd.
UC Career Connect
Register for events, create a visual profile for employers, and apply for jobs and internships through our online portal.
1Cybersecurity Ventures (2018, April 18). 2018 Cybersecurity Market Report. Retrieved December 6, 2018, from https://cybersecurityventures.com/cybersecurity-market-report/
2Morgan, S. (2017, June 06). CSO from IDG, Cybersecurity labor crunch to hit 3.5 million unfilled jobs by 2021. Retrieved December 6, 2018, from https://www.csoonline.com/article/3200024/security/cybersecurity-labor-crunch-to-hit-35-million-unfilled-jobs-by-2021.html
3Bureau of Labor Statistics, U.S. Department of Labor, Occupational Outlook Handbook, Information Security Analysts, retrieved on December 6, 2018, from https://www.bls.gov/ooh/computer-and-information-technology/information-security-analysts.htm