Online Certificate of Advanced Studies in Monitoring, Surveillance, and Intelligence Operations: Career Outlook

Gain the skill set to catch online malicious behavior.

There is a growing need for professionals who have the technical and research skills to understand and catch adversaries and criminal groups hiding malicious online behavior. For 2019, the U.S. government earmarks $15 billion for cybersecurity-related activities, which is a four percent increase from the previous year.3

  • $95,510 average salary for information security professionals1
  • 28% employment growth projected from 2016 to 2026, much faster than the national average1
  • 3.5 million unfilled cybersecurity jobs projected by 20212

Similar to any profession, career advancement largely depends on your education and experience in the field. When you're ready to pursue more education, Utica College offers seamless credit transfer into the Master's in Cybersecurity, Master’s in Cybersecurity: Cyber Policy Specialization, or Masters of Business Administration (MBA) degree programs — allowing you to complete your master's in less than two years.4

Career Opportunities

Graduates from this certificate have gone on to work in positions like these:

  • Information Security Analyst: Provide and implement security solutions that maximize productivity for organizations while following strict privacy policies. Main duties include research, collecting data, and developing security strategies.
  • Intelligence Analyst: Collect, analyze, and report intelligence that uncovers the intentions of foreign governments and non-state entities worldwide. You'll also monitor trends and identify intelligence gaps within an organization.
  • Information Security Manager: Manage an organization's IT security, from creating security solutions to implementing policies, including training and mitigation procedures. You'll also be responsible for leading audits and forensic investigations.

 
Request More Information

We'd love to get to know you and hear more about your educational and professional goals. If you'd like to learn more about one of our programs, fill out this form and we'll be in touch:

          I consent to receiving SMS/MMS messages generated by an autodialer from Utica College or its representatives at the mobile number I provided. Consent is not required to receive information. Message & data rates may apply. Send STOP to 35254 to unsubscribe. Send HELP to 35254 for help. Click here for Terms & Conditions and Privacy Policy
          Yes! I'd like to schedule an appointment with an admissions counselor.If this option is not selected, an admission specialist will still contact you at a time of their choosing.
          CAPTCHA
          This question is for testing whether or not you are a human visitor and to prevent automated spam submissions.

          Learning Outcomes

          • Understand the role that cyber plays in the overall process of the intelligence cycle

          • Analyze and assess cyberspace ethics and laws

          • Understand the international and cultural aspects of cybersecurity, cyber intelligence, and cyber conflict

          • Analyze and assess methods for cyber monitoring, cyber intelligence, cyber fusion, and cyber surveillance

          • Create cyberspace policies that enforce security and privacy.

          Continue Your Education

          When you're ready to advance your education, you may seamlessly transfer equivalent courses from this certificate into this degree:

          Note that not all of your credit hours may transfer into these degrees. You must first obtain permission from the Program Director.

          Beyond the Degree

          We have the tools to help you make your next career move:

          One-on-One Mentors

          Work with your program director and professors for professional mentorship and support.

          Job Search Assistance

          Build your résumé, do mock interviews, and find new opportunities in your area.

          Career Counseling

          Have our experts review your résumé and LinkedIn and learn to stand out from the crowd.

          UC Career Connect

          Register for events, create a visual profile for employers, and apply for jobs and internships through our online portal.

          SOURCES:

          1Information Security Analysts. (2018, April 13). Retrieved January 7, 2019, from https://www.bls.gov/ooh/computer-and-information-technology/information-security-analysts.htm
          2Morgan, S. (2017, June 06). Cybersecurity labor crunch to hit 3.5 million unfilled jobs by 2021. Retrieved January 7, 2019, from https://www.csoonline.com/article/3200024/security/cybersecurity-labor-crunch-to-hit-35-million-unfilled-jobs-by-2021.html
          3Norton by Symantec Emerging Threats. (2018). 10 Cybersecurity Facts and Statistics for 2018. Retrieved January 17, 2019, from https://us.norton.com/internetsecurity-emerging-threats-10-facts-about-todays-cybersecurity-landscape-that-you-should-know.html