Earn Your University of Fairfax Information Security Professional Practices Graduate Certificate Online

The Information Security Professional Practices certification program consists of 3 online courses (9 credit hours).

Students develop competencies in assessing threats and vulnerabilities of information systems, designing security procedures and practices that are executed in the protection of data and information systems, and analyzing the validity and reliability of information to ensure that an information system will operate at a proposed level of trust. This Certificate provides students with the essentials to demonstrate their knowledge, advance their career in the cybersecurity community. It provides students the essential concepts needed to design, engineer, implement and run an information security program.


IA8060   Intrusion Detection, Attacks, and Countermeasures

In this course, students will examine common attack methods, technologies and countermeasures. Students will also gain the skills needed to recognize various stages and methods of attack on the enterprise.

Course Objectives

  • Name and describe the steps in conducting a session in hijacking
  • Analyze the different types of attacks used against web servers
  • Describe the anatomy of an attack
  • Discuss the methodology of an attacker using a password cracker
  • Differentiate between different Web browsers in regards to security and privacy features
  • Describe the steps for performing SQL injection

IA8020   Security Policies, Standards and Procedures

In this course, students will explore digital forensics and computer investigations. This course will provide insight on conducting an investigation, reviewing certification requirements, determining the best data acquisition method, processing a computer investigation scene, evaluating needs for digital forensics tools, and applying forensics skills and techniques.

Course Objectives

  • Summarize how to conduct an investigation, including critiquing a case
  • Describe components used to build a business case for developing a forensics lab
  • Explain guidelines for seizing digital evidence at the scene
  • Describe methods for validating and testing digital forensics tools
  • Describe standard procedures in network forensics and network-monitoring tools
  • Explain how to approach investigating social media communications

IA8030   Design, Development and Evaluation of Security Controls

In this course, you will learn the concepts to plan, govern, implement, and manage an information security program. It is holistic and comprehensive, and provides a path to consider all aspects of information security and to integrate security into the fabric of the things we depend on and use. It provides specific guidance on strategy, policy development, risk identification, personal management, organization, and legal matters, and places them in the context of a broader ecosystem.

Course Objectives

  • To analyze the factors influencing the need for an information security program and what a program consists of.
  • To evaluate information security governance and risk management.
  • To evaluate information security models and management practices.
  • To analyze information security policies and contingency planning.
  • To evaluate personnel security and protection mechanism.



Join the Cybersecurity Elite
U of F Cybersecurity Education Path

Education Path
Distinguish yourself and advance your cybersecurity career by following the University of Fairfax Online Cybersecurity Education Path. No matter which graduate program you pursue, all of your courses will explore relevant cybersecurity policy and management issues, and you will complete a cybersecurity project in each course. You can apply what you learn and make significant contributions in your workplace right away.
» Download PDF or register for a