Earn Your University of Fairfax Information Security Professional Practices Graduate Certificate Online
The Information Security Professional Practices certification program consists of 3 online courses (9 credit hours).
Students develop competencies in assessing threats and vulnerabilities of information systems, designing security procedures and practices that are executed in the protection of data and information systems, and analyzing the validity and reliability of information to ensure that an information system will operate at a proposed level of trust. This Certificate provides students with the essentials to demonstrate their knowledge, advance their career in the cybersecurity community. It provides students the essential concepts needed to design, engineer, implement and run an information security program.
IA8060 Intrusion Detection, Attacks, and Countermeasures
In this course, students will examine common attack methods, technologies and countermeasures. Students will also gain the skills needed to recognize various stages and methods of attack on the enterprise.
- Name and describe the steps in conducting a session in hijacking
- Analyze the different types of attacks used against web servers
- Describe the anatomy of an attack
- Discuss the methodology of an attacker using a password cracker
- Differentiate between different Web browsers in regards to security and privacy features
- Describe the steps for performing SQL injection
IA8020 Security Policies, Standards and Procedures
In this course, students will explore digital forensics and computer investigations. This course will provide insight on conducting an investigation, reviewing certification requirements, determining the best data acquisition method, processing a computer investigation scene, evaluating needs for digital forensics tools, and applying forensics skills and techniques.
- Summarize how to conduct an investigation, including critiquing a case
- Describe components used to build a business case for developing a forensics lab
- Explain guidelines for seizing digital evidence at the scene
- Describe methods for validating and testing digital forensics tools
- Describe standard procedures in network forensics and network-monitoring tools
- Explain how to approach investigating social media communications
IA8030 Design, Development and Evaluation of Security Controls
In this course, you will learn the concepts to plan, govern, implement, and manage an information security program. It is holistic and comprehensive, and provides a path to consider all aspects of information security and to integrate security into the fabric of the things we depend on and use. It provides specific guidance on strategy, policy development, risk identification, personal management, organization, and legal matters, and places them in the context of a broader ecosystem.
- To analyze the factors influencing the need for an information security program and what a program consists of.
- To evaluate information security governance and risk management.
- To evaluate information security models and management practices.
- To analyze information security policies and contingency planning.
- To evaluate personnel security and protection mechanism.
Join the Cybersecurity Elite
U of F Cybersecurity Education Path
» Download PDF or register for a