There is a growing need for professionals who have the technical and research skills to understand and catch adversaries and criminal groups hiding malicious online behavior. For 2019, the U.S. government earmarks $15 billion for cybersecurity-related activities, which is a four percent increase from the previous year.3
Online Certificate of Advanced Studies in Monitoring, Surveillance, and Intelligence Operations: Career Outlook
Gain the skill set to catch online malicious behavior.
- $95,510 average salary for information security professionals1
- 28% employment growth projected from 2016 to 2026, much faster than the national average1
- 3.5 million unfilled cybersecurity jobs projected by 20212
Similar to any profession, career advancement largely depends on your education and experience in the field. When you're ready to pursue more education, Utica College offers seamless credit transfer into the Master's in Cybersecurity, Master’s in Cybersecurity: Cyber Policy Specialization, or Masters of Business Administration (MBA) degree programs — allowing you to complete your master's in less than two years.4
Graduates from this certificate have gone on to work in positions like these:
- Information Security Analyst: Provide and implement security solutions that maximize productivity for organizations while following strict privacy policies. Main duties include research, collecting data, and developing security strategies.
- Intelligence Analyst: Collect, analyze, and report intelligence that uncovers the intentions of foreign governments and non-state entities worldwide. You'll also monitor trends and identify intelligence gaps within an organization.
- Information Security Manager: Manage an organization's IT security, from creating security solutions to implementing policies, including training and mitigation procedures. You'll also be responsible for leading audits and forensic investigations.
Request More Information
We'd love to get to know you and hear more about your educational and professional goals. If you'd like to learn more about one of our programs, fill out this form and we'll be in touch:
Understand the role that cyber plays in the overall process of the intelligence cycle
Analyze and assess cyberspace ethics and laws
Understand the international and cultural aspects of cybersecurity, cyber intelligence, and cyber conflict
Analyze and assess methods for cyber monitoring, cyber intelligence, cyber fusion, and cyber surveillance
Create cyberspace policies that enforce security and privacy.
Continue Your Education
When you're ready to advance your education, you may seamlessly transfer equivalent courses from this certificate into this degree:
- Master of Science in Cybersecurity
- Master of Science in Cybersecurity: Cyber Policy Specialization
- Masters of Business Administration (MBA)
Note that not all of your credit hours may transfer into these degrees. You must first obtain permission from the Program Director.
Beyond the Degree
We have the tools to help you make your next career move:
Work with your program director and professors for professional mentorship and support.
Job Search Assistance
Build your résumé, do mock interviews, and find new opportunities in your area.
Have our experts review your résumé and LinkedIn and learn to stand out from the crowd.
Register for events, create a visual profile for employers, and apply for jobs and internships through our online portal.
1Information Security Analysts. (2018, April 13). Retrieved January 7, 2019, from https://www.bls.gov/ooh/computer-and-information-technology/information-security-analysts.htm
2Morgan, S. (2017, June 06). Cybersecurity labor crunch to hit 3.5 million unfilled jobs by 2021. Retrieved January 7, 2019, from https://www.csoonline.com/article/3200024/security/cybersecurity-labor-crunch-to-hit-35-million-unfilled-jobs-by-2021.html
3Norton by Symantec Emerging Threats. (2018). 10 Cybersecurity Facts and Statistics for 2018. Retrieved January 17, 2019, from https://us.norton.com/internetsecurity-emerging-threats-10-facts-about-todays-cybersecurity-landscape-that-you-should-know.html