top of page

Cybersecurity Specialist

The Cybersecurity Specialist program is a part-time program designed to provide a practical understanding of activities related to the protection of information and technology assets of an organization. Students will develop necessary skills and competencies to conduct risk analysis, implement technical security controls, and handle day-to-day cybersecurity operations in organizations. 

Program Aligned with In-demand

Cybersecurity Certifications

Book and Pen

01

Capstone Cybersecurity Industry Project for Portfolio Development

02

Two Certification Bootcamps & Test Prep Material Included

03

Career Xcelerator for Job Readiness, Professional Growth & Employment Support

04

Four Industry-Oriented Courses Taught by Expert Instructors

Invest in Your Future

1

Program Costs

Pay Upfront 

Four Payments 

Flexible Financing

2

Scholarships: $2,000

Four Scholarships

Supporting Diversity

Transitioning Veterans

3

Secure Financing in 5 min

Payment Deferments

Until 3 Months After

Program Completion

Job Roles

Program prepares you for positions of:

Cybersecurity Risk Analyst

Cybersecurity Specialist

Disaster Recovery Professional

Governance Risk & compliance (GRC) Specialist

​

Cybersecurity Salaries

Source: Cyberseek.org

Cybersecurity Specialist

Cybersecurity Specialist

Average Salary: $107,000

Job Openings: 10,159

Cybersecurity Architect

Cybersecurity Architecture

Average Salary: $163,000

Job Openings: 5,987

Cybersecurity Analyst

Cybersecurity Analyst

Average Salary: $109,537

Job Openings: 28,722

Cybersecurity Manager

Cybersecurity Manager

Average Salary: $138,070

Job Openings: 20,033

Cybersecurity Consultant

Cybersecurity Consultant

Average Salary: $92,963

Job Openings: 21,284

IT Auditor

IT Auditor

Average Salary: $111,400

Job Openings: 7,880

Professional Certificate

Earn Professional Certificate in Cybersecurity Specialist recognized by the Colorado Department of Higher Education (CDHE) - Division of Private Occupational Schools (DPOS)

Program Outline

You will complete four courses learning about cybersecurity risk management, cybersecurity infrastructure and technologies, enterprise cybersecurity operations, and cybersecurity project.

Cybersecurity Risk Management

This course focuses on managing cybersecurity risks. It will help participants prepare in conducting risk assessment based on industry best practices. We will cover cost-benefit analysis in determining effective technical controls to be implemented. The participants will learn about risk mitigation techniques and challenges with risk management. It presents different risk management methodologies and standards widely in use in industry. 

Cybersecurity Infrastructure & Technologies

This course will introduce participants to cybersecurity technologies essential to defend an organization from cyber-attacks. We will cover securing networks, software, and IT infrastructure. The participants will learn about principles of computer security and cryptography along with establishing user authentication and access controls. This course will prepare participants to handle a wide range of issues related to intrusion detection and prevention systems, wireless and mobile device security, virtualization, and cloud computing. 

Enterprise Cybersecurity Operations

This course will prepare participants to effectively manage cybersecurity operations. We will focus on developing cybersecurity program for an organization. It will cover leading industry accepted models along with national and international standards. The participants will learn how to plan for business continuity and implement technologies to recover from disasters. We will apply effective incident handling techniques to mitigate consequences from cybersecurity incidents. 

Cybersecurity Capstone Project 

Students are required to complete a cybersecurity project to complete this program. The project is a practical demonstration integrating knowledge accumulated over the courses. Students may develop a project on a topic of interest pertaining to cybersecurity infrastructure, risk management, enterprise cybersecurity operations, or disaster recovery. 

Learning

Learning Experience

Balanced Objects

Expert Instructors

Stationary photo

Career Xcelerator

Cyber students creative working

​

348 Learning Hours

Learning hours dedicated for Lectures, Labs, Exercises and Project Activities across all courses. (Expect to spend additional hours each week to study and complete assignments)

Accredited Training Partner for Leading Industry Certification Providers

ISACA
CompTIA
EC Council

Enrollment

Eligibility: High School Diploma

Prospective students must have a high school diploma or equivalency diploma to be accepted for enrollment. (Alternatively, eligible students may complete an ability to benefit test.)

Step 1: Application

Complete a simple online application form including a statement of interest. 

Step 2: Interview

Schedule an interview. The interview is designed to gauge candidates who are driven and have a strong interest in pursuing a career in cybersecurity.

bottom of page