Information Security

Program details

Credits required: 15 or 30

Location Format   
Online Online

Tuition: $635.95 per credit
Financial aid
Tuition calculator

Industry highlights

Graduate certificate and degree

Get ready for the next step in your IT career in the growing information security field

Information technology professionals need to improve their information security skills and knowledge. Whether an IT worker wants to move into the infosec field or not, he or she becomes a valuable asset to an organization with cybersecurity training. This graduate certificate will enable any IT graduate with a bachelor’s degree to specialize in either information security management or secure software and engineering.

This increased demand inspired WMU to offer a management and engineering track in the information security graduate certificate program. Whether you're a graduate student or industry professional, this certificate will give you marketable experience, prepare you for the SANS GIAC, CISSP, CISA, ITIL tests and provide the credentials to help you pursue these expanding career opportunities.

43% of job postings in 2016 listed at least one of these industry certifications Burning Glass Technologies: Labor Insight. 2017

The online flexibility you want for the move you have been waiting

If you have an IT background, this 15-credit graduate certificate or 30-credit graduate degree in information security is for you

WMU’s information security graduate certificate is 100% online and offers two 10-month tracks: secure software and engineering or information security management.

The Information Security, M.S can be completed in under two years in the same 100% online format by combining the two tracks.

All students will take two core foundational courses. Each course is 7.5 weeks long and taught by WMU faculty from Haworth College of Business and College of Engineering and Applied Sciences.

Mandatory foundational core courses (6 credits):

  • CIS 5710 Information Security Fundamentals

    This course examines information security fundamentals needed for a basic understanding of the Information Security discipline. The course covers basic attacks and vulnerabilities against an organization as well as their mitigation, managerial and legal requirements for organizations, professional ethics, and security policy formation and implementation. This course will help students understand identity and access management, asset security, and risk management. Finally, students will learn the importance of assessing and testing security frameworks to ensure robust incident response, disaster recovery, and business continuity plans. Case projects and scenarios are used throughout the course to illustrate, test, and understand these topics.

    Prerequisites/Corequisites: Prerequisite: Admission to the Graduate College or senior standing.

    Credits: 3 hours

    Notes: Open to upperclass and graduate students.

  • CS 5710 Network Security Fundamentals

    This course examines the network security fundamentals needed for a basic understanding of the Information Security discipline. The course covers basic attacks and vulnerabilities against an organization’s network infrastructure as well as their mitigation’s. This course will help students understand network addressing, protocols, and vulnerabilities. Finally, students will learn to capture and analyze network traffic to monitor for potential attacks. Practical exercises and labs will be used during this course to allow the students to apply these concepts in real-world scenarios.

    Prerequisites/Corequisites: Prerequisite: Admission to the Graduate College or senior standing.

    Credits: 3 hours

For the Graduate Certificate, pick one of the two tracks below:

Information security management track (9 credits)

  • CIS 6710 Information Assurance and Security

    This course examines information security assurance and security approaches, models, strategies, and techniques. The course reviews major core topics such as the rationales and planning for information security, but then moves into more detailed examination of risk management concepts such as assessment, controls, and continuity planning strategies. This course will help students understand the need for business impact analyses, recovery planning and processes, as well as the importance of information security education, training, and awareness to organizations. Students will learn how to implement information security policies and procedures as well as how to maintain an organization’s information security profile over time. Case projects and scenarios are used throughout the course to illustrate, test, and understand these topics.

    Prerequisites/Corequisites: Prerequisites: CIS 5710 and CS 5710.

    Credits: 3 hours

    Notes: Open to graduate students only.

  • CIS 6720 IT Governance and IT Service Management

    This course provides foundation-level training for IT professionals to gain an understanding of the ITIL terminology. Students will gain knowledge of the ITIL service lifecycle and the ITIL processes, roles, and functions. Students will also gain an understanding of how the service lifecycle provides effective and efficient IT services that are aligned to, and underpin, business processes.

    Prerequisites/Corequisites: Prerequisites: CIS 5710 and CS 5710.

    Credits: 3 hours

    Notes: Open to graduate students only.

  • CIS 6730 Cyberwarfare, Cybercrime, and Digital Forensics

    This course examines three major disciplines in information security: Cyberwarfare, Cybercrime, and Digital Forensics. Although each area of study is worthy of its own focus, this course introduces students to the major approaches, concepts, and skills needed to understand and potentially pursue a more in depth study of each.

    In the Cyberwarfare section, students learn how military and nation state approaches to cyberwarfare differ from those in the business sector. Topics include cyberspace intelligence operations, offensive and defensive cyberwarfare, military doctrine, and evolving threat strategies. Case projects and real-world incidents underscore the importance of comprehending the cyberwarfare landscape and the potential nonstate actor (e.g., businesses) implications.

    In the Cybercrime section, students study the various categories of cybercrimes to include crimes against computers, crimes against people, cyberfraud, and illicit content instances. Topics such as DDOS attacks, ransomware, phishing, cyberbullying, and hate sites will be discussed in terms of what they are and how information security experts must address them.

    Finally, digital forensics investigation procedures to include data acquisition, file recovery, and chain of custody will be studied. Students will learn about various digital forensic tools and procedures, as well as specialized forensic investigations, such as cloud, mobile, and social media forensics procedures. Many topics and exercises will help students learn how to address both policy and legal challenges involved in dealing with the Cybercrime categories introduces earlier in the course.

    Prerequisites/Corequisites: Prerequisites: CIS 5710 and CS 5710.

    Credits: 3 hours

    Notes: Open to graduate students only.

Secure software and engineering track (9 credits)

  • CS 5730 Secure System Administration

    This course will address the theory and practices involved in securely delivering services from both Linux/Unix and Windows servers in a networked environment. Topics will include encrypted communication channels, intrusion detection systems and log monitoring, and secure consumption of services by client systems. The course covers tools and techniques for building and maintaining servers in a secure manner.

    Prerequisites/Corequisites: Prerequisites: CIS 5710 and CS 5710.

    Credits: 3 hours

    Notes: Open to upperclass and graduate students.

  • CS 5740 Web Application Security

    This course will address the theory and practices involved in implementing, managing, or protecting Web applications. Students will learn about the underlying technologies and architecture decisions that go into developing a secure application and will learn the skills necessary to evaluate, implement, and test security measures in web applications. Students will complete several practical exercises and labs that will demonstrate and reinforce the theoretical concepts introduced in the course.

    Prerequisites/Corequisites: Prerequisites: CIS 5710 and CS 5710.

    Credits: 3 hours

    Notes: Open to upperclass and graduate students.

  • CS 5750 Secure Software Development

    This course covers the theory and practice of software security, focusing on common software security risks including: identification of potential threats and vulnerabilities, methods and tools for identifying and eliminating security vulnerabilities and coding principles to avoid security holes in new software. The course covers essential guidelines for building secure software: how to design software with security in mind from the ground up and to integrate analysis and risk management throughout development.

    Prerequisites/Corequisites: Prerequisites: CIS 5710 and CS 5710.

    Credits: 3 hours

    Notes: Open to upperclass and graduate students.

To complete the graduate degree program select at least five of the six above courses, plus two or three of the electives below:

  • CIS 6300 Business Data Management

    The focus of this course is Business Data Management. Students learn relational database design, management, administration, implementation, data security, and data migration (ETL). Students are introduced to the Big Data concept and NoSQL database. Database software such as Microsoft SQL Server, MongoDB, and related business intelligence and development tools may be used.

    Prerequisites/Corequisites: Prerequisite: Admission to the MBA, MSA or MS in Information Security program or the approval of the Graduate advisor.

    Credits: 3 hours

    Notes: Open to graduate students only.

  • CIS 6620 Business Project Management

    This course examines the concepts, techniques, methodologies and tools for an effective management of business, personal, information technology, and other types of projects. Students will learn the skills to define project scope, create project plans, and manage key aspects of projects around the phases of project life cycle. The course involves lectures, discussions, small-group work and other exercises.

    Prerequisites/Corequisites: Prerequisite: Admission to the MBA, MSA, MS in Information Security, or MS in Supply chain Management or the approval of the Graduate advisor.

    Credits: 3 hours

    Notes: Open to graduate students only.

  • CIS 6660 Information Security Operations Management

    This course explores the major challenges in managing a secure production environment. Mitigation of both external and internal threats, as well as planning, addressing, and recovering from security incidents via systematic processes are covered in detail. Topics such as asset management, access and identity management, backup management, data availability and recovery, and patch management will be addressed in diverse organizational contexts to include both physical and virtual components. Developing and implementing Disaster Recovery Plans and Business Continuity Plans, as well as other techniques designed to insure continuity and security of operations will be discussed. This course will provide professionals with the requisite background to administer and manage people, data, media, hardware, and protect against the multitude of threats and attacks in a production environment.

    Prerequisites/Corequisites: Prerequisite: Admission to the MBA, MSA or MS in Information Security program or the approval of the Graduate advisor.

    Credits: 3 hours

    Notes: Open to graduate students only.

  • CS 6730 Installation Hardening

    This course will teach students to harden individual Linux and Windows installations. Access control policies and the Principle of Least Privilege will be discussed. Intrusion prevention and detection solutions will be implemented in practical labs to demonstrate the real-world decisions and risk analyses involved in hardening systems.

    Prerequisites/Corequisites: Prerequisites: CS 5710 and CIS 5710.

    Credits: 3 hours

    Notes: Open to graduate students only.

  • CS 6740 Wireless Ethical Hacking

    This course will teach students to identify and evaluate threats from widely-used wireless technologies such as WiFi, Bluetooth, ZigBee, Z-Wave, and DECT. Students will complete various hands-on labs to learn how to apply these concepts in real-world scenarios.

    Prerequisites/Corequisites: Prerequisites: CS 5710 and CIS 5710.

    Credits: 3 hours

    Notes: Open to graduate students only.

  • CS 6750 Networking Penetration Testing

    This course covers the techniques and methodology of network penetration testing. Students will learn how to plan and define the scope of a penetration testing project, perform reconnaissance on the target environment, and use various tools and techniques to exploit and gain access to target systems. Finally, students will create a report detailing discovered vulnerabilities and an analysis of the business risks involved.

    Prerequisites/Corequisites: Prerequisites: CS 5710 and CIS 5710.

    Credits: 3 hours

    Notes: Open to graduate students only.

Education that matters; to society, your company and yourself

If you're already a professional in the information technology field, a certificate in information security can give you the career acceleration you have been looking for without having to commit to a full-time graduate program and from the comfort of your own computer.

If you are looking to take the next step from your help-desk career or gain a unique credential, this growing field is looking for professionals who can come in with the needed experience and education without a long learning-curve.

Learn how to protect your most valued asset, your future

This is a global field. Graduates will be prepared to sit for a number of qualification credentials in information technology that jobs around the world are looking for on a daily basis. The two tracks make it flexible to find which path is right for you and specialize in a program that could not only get you this credential but because it is from WMU, you may be able to use these classes as a specialization for a graduate degree, like an MBA.

Employer tuition reimbursement

If your employer has a tuition reimbursement program, find out about WMU’s deferment program for employer paid tuition.

"Best bang for the buck"

Washington Monthly placed WMU on a list of national universities that offer " the best bang for the buck ." WMU came in at No. 50 based on the economic value students receive per dollar.