The Cybersecurity Architecture program will prepare participants for a career in cybersecurity focusing on positions of cybersecurity architecture, information security engineering and technical consulting. This program focuses on providing a practical understanding of information security architecture and how to develop security architectures that provide real world security defenses to meet organizational requirements. This program is designed for professionals already working in IT/cybersecurity or who recently took on responsibilities in the area.
Program Aligned with In-demand
Capstone Cybersecurity Industry Project for Portfolio Development
Two Certification Bootcamps & Test Prep Material Included
Career Xcelerator for Job Readiness, Professional Growth & Employment Support
Seven Industry-Oriented Courses Taught by Expert Instructors
Program prepares you for positions of:
Cyber Security Engineer
Information Security Architect
Cybersecurity Technical Consulting
Cybersecurity is in demand.
Average Salary: $107,000
Job Openings: 10,159
Average Salary: $163,000
Job Openings: 5,987
Average Salary: $109,537
Job Openings: 28,722
Average Salary: $138,070
Job Openings: 20,033
Average Salary: $92,963
Job Openings: 21,284
Average Salary: $111,400
Job Openings: 7,880
Earn Professional Certificate in Cybersecurity Architecture recognized by the Colorado Department of Higher Education (CDHE) - Division of Private Occupational Schools (DPOS)
This program includes seven courses, hands-on skill development, and guided projects. Students will learn what “good” looks like and how to deliver architectural specification that can then be implemented by the organization. Focus on leveraging existing frameworks, understanding the technology options available and development of real-world solutions will prepare students for taking their career to the next level.
Principles of Security Architecture
This course focuses on the basic principles of cyber security architecture. It covers topics such as defense in depth, the various layers of an appropriate security architecture, and the importance of cohesive security architecture. Participants will gain an understanding of what the end state should look based on industry best practices and typical security architectural lifecycles.
Business Requirements & Cybersecurity Frameworks
This course will introduce participants to the key stakeholders for cybersecurity architect services within various organizations and key consumers of security architecture. Commonly accepted cyber security frameworks and standards will be introduced, and participants will learn how to adopt various components of these standards within their architecture designs.
This course will provide the participant with an understanding of the various defensive cyber security technologies available in the marketplace today. Participants will examine various vendor agnostic technology options for use in cybersecurity architecture. Participants will learn how to effectively select an appropriate technology stack and how integrated and standalone solutions may be leveraged.
Network Security & Cloud Deployments
This course will prepare participants to effectively design secure network infrastructures to meet various stakeholder requirements. Participants will learn how to evaluate existing network architectures for their cybersecurity posture. Challenges of handling cyber security in a cloud environment will also be introduced enabling participants to make key design decisions when dealing with organizations' cloud usage.
This course focuses on managing cybersecurity at the endpoint. The endpoints in this course include but not limited to the end user workstations/laptops, mobile devices, IoT, and identity and access management. Students will gain an understanding of the nuances of end point security in various industries such as healthcare, manufacturing, finance, retail, and others.
Data & Application Security
This course will introduce students to various architectural approaches focused on data protection. Students will gain an understanding of how security control requirements follow the data and how to develop and document the appropriate controls. The second part of this course will shift focus to the security architect’s role with regards to protecting the applications that with touch the data.
Capstone Cybersecurity Project
This project course integrates all the knowledge accumulated through the previous courses and serves as a capstone for the Cybersecurity Architecture program. The project is a practical demonstration on best practices for subject matter covered over the courses. Students may alternatively develop a project on a topic of interest pertaining to cybersecurity architecture such as architecture assessments of an organization, merger and acquisition integration, cloud migration of existing information system, setting up a new information system platform or similar project.
399 Learning Hours
Learning hours dedicated for Lectures, Labs, Exercises and Project Activities across all courses. (Expect to spend additional hours each week to study and complete assignments)
Accredited Training Partner for Leading Industry Certification Providers
Eligibility: High School Diploma
Prospective students must have a high school diploma or equivalency diploma to be accepted for enrollment. (Alternatively, eligible students may complete an ability to benefit test.)
Step 1: Application
Complete a simple online application form including a statement of interest.
Step 2: Interview
Schedule an interview. The interview is designed to gauge candidates who are driven and have a strong interest in pursuing a career in cybersecurity.