Certificate programs provide interested students a credential for successfully completing a particular set of courses in conjunction with any major.
Certificates may be earned in addition to a degree or as a stand-alone program of study for students who have already earned a degree. Certificates are intended to encourage and document focused study of a particular area of interest.
Completed cyber certificates appear as part of a student's transcript to provide a documented credential of this study. Certificates should not be confused with professional certifications awarded by bodies outside the university, although certificates can be a good stepping stone to obtaining professional certifications.
Augusta University is proud to be a part of the National Cybersecurity Workforce Development Program, a continuing education program geared towards military veterans, transitioning military members and first responders to prepare them for the cyber workforce. As a partner of the academic coalition in this program, we have created the Cyber Workforce Transition Program pathway, which offers our cyber defender certificate to transitioning military members or veterans looking to join the exciting cybersecurity workforce.
The goal of the Cyber Defender certificate program is to prepare certificate earning graduates for entry-level information technology positions such as system administration, entry-level Security Operation Center (SOC) security analyst, etc.
The Cyber Defender Certificate can be completed in one academic year. To earn the Cyber Defender Certificate, students must complete the following courses with grades of "C" or better:
CSCI 1301 - Principles of Computer Programming I
A rigorous study of the principles of computer programming with emphasis on problem solving methods which result in correct, well-structured programs. Other topics: an introduction to data representation, data types and control structures, functions, and structured data types.
AIST 2120 - Principles of Scripting and Automation
An intermediate programming course focused on solving and automating common Information Technology challenges using a contemporary scripting language. Topics include command line interfaces, scripted control structures, arrays and dictionaries, object-oriented design concepts, and text processing. Prerequisite(s): CSCI 1301 with a grade of C or better.
CYBR 2600 - Introduction to Networking and Cyber Security
Overview of information security practices and needs. Topics include information security, types of attacks, risk analysis and management, security technologies, and basic information security implementation. Prerequisite(s): CSCI 2700 and either AIST 2320 or MINF 3614, or permission of instructor.
CSCI 2700 - Ethics in Computer Science
A study of the ethical, social and legal impacts of computers and their applications. Specific attention will be paid to professional responsibility, issues of privacy, property rights, legal issues and real risks. Corequisite: CSCI 1301.
Choose two of the following courses:
AIST 3720 - Operating System Concepts and Administration
An introduction to operating systems geared towards future administrators. Includes coverage of operating system roles, functions and services, hardware components, virtualization, and the installation, configuration, and administration of a secure operating system. Prerequisites: AIST 2120 and CYBR 2600 with a grade of C or better.
AIST 3320 - TCP/IP Protocol Analysis
Introduces network packet analysis and network traffic analysis techniques. Course provides in-depth coverage of the TCP/IP protocol suite. Popular diagnostic tools are used to monitor protocols in action and to understand how the network protocols work. Prerequisite(s): CYBR 2600 with a grade of C or better.
CYBR 3100 - Introduction to Defensive Cyber Operations
Overview of network security activities and techniques. Heavy use of information security tools will be demonstrated and practiced. Prerequisite(s): CSCI 3520 or CYBR 2600 with a grade of C or better.
CYBR 3200 - Cyber Network Defense and Counter Measures
Emphasis placed on understanding the tools and devices used to secure a computer network (i.e. firewall, IDS, IPS). Course includes hands-on lab activities where techniques and procedures are displayed and tested. Prerequisite(s): CSCI 3520 or CYBR 2600 with a grade of C or better.
CYBR 4400 - Digital Forensics
Overview of information security forensics activities. Topics include digital forensics investigative basics, techniques, and digital forensics examination criteria. Course includes hands-on lab activities where techniques and procedures are displayed and tested. Prerequisite(s): AIST 3720 with a grade of C or better.
The goal of the Advanced Cyber Defender Certificate arms graduates with the specific, core skills needed to be successful in entry-level cybersecurity positions, such as network defense monitoring and penetration testing.
The Advanced Cyber Defender certificate can be completed in one year, following the completion of the Cyber Defender certificate. To earn this certificate, students must complete the following courses with grades of "C" or better:
All remaining electives from the Cyber Defender Certificate, in addition to:
AIST 4720 - Enterprise System Architectures
A broader examination of operating systems as used in secure, large-scale enterprise environments. Includes coverage of virtualized/hosted/cloud-based systems and services, network storage, configuration & change management, distributed authentication, and other contemporary concepts. Prerequisite: AIST 3720 with a grade of C or better.
AIST 3410 - Database Management Systems or CSCI 3410 - Database Systems
MATH 2210 - Elementary Statistics
A study of frequency distributions of data, graphical and numerical presentations of data, probability, discrete and continuous distributions, sampling distributions, estimation, hypothesis testing, simple linear regression and correlation and goodness of fit. (Credit will not be given for both MATH 2210 and MATH 3110.)
MINF 2650 - Principles of Data Management or CSCI 3400 - Data Structures