Cybersecurity Workforce Education Program

Cybersecurity Workforce Education Program

Non-Credit Courses

  • Business Continuity and Disaster Recovery - ITE 005

    Every organization is at risk of some type of interruption or disaster and must plan accordingly. This course, aimed at business and IT professionals, steps students through three important protection plans: a business impact analysis (BIA), a business continuity plan (BCP), and a disaster recovery plan (DRP).

  • Computer Forensics Evidence Collection - ITE 006

    Business computers and the data they contain are targets of an increasing number of attacks, which has brought electronic evidence and information gathering to the forefront of incident response. This course focuses on computer forensics and evidence collection techniques. You will learn tips for controlling a digital forensic investigation and techniques for seizing, collecting, and protecting evidence.

  • Ethical Hacking Tools and Techniques - ITE 007

    This course is designed for IT professionals who require in-depth knowledge of ethical hacking techniques to test the security of their networks. Areas of instruction include the fundamentals of hacking and penetration testing, footprinting, vulnerability scanning and exploits, and network traffic analysis.

  • Information Security and Risk Management Planning - ITE 010

    Business managers and IT professionals alike depend on risk management to make appropriate decisions for their organizations. This course covers the essentials of risk management, compliance laws that affect risk management, and how to create a risk management plan.

  • Locking Down Linux User Accounts, Filesystems, and Services - ITE 001

    In this course, you'll get hands-on experience configuring and managing security on Linux machines. You'll first review basic security controls, and then dive deep into user management and security the Linux filesystem and services. The course focuses on Red Hat Enterprise Linux (RHEL), Ubuntu, Fedora, and CentOS, but many of the concepts apply to Linux in general.

  • Managing Information Security Risks, Threats, and Vulnerabilities - ITE 008

    This course covers the fundamentals of information systems security and offers hands-on practice with countermeasures against malicious code and network attacks. Students also learn on-going mitigation techniques that reduce risk to IT environments. The course is geared toward entry-level IT professionals.

  • Network Security Essentials - ITE 009

    Need a refresher on the basics of network security? This course explores TCP/IP network protocols and applications, network threats and vulnerable points of access, and different tools and techniques that strengthen network security.

  • Protecting Networks with Firewalls and VPNs - ITE 002

    Two key technologies for protecting a network are firewalls and virtual private networking. This course explores firewall fundamentals, rules, filters, design strategies, and deployment best practices. Students also learn about virtual private networks (VPNs) for secure remote access.

  • Protecting Windows Systems with Access Controls, Encryption, and Group Policy - ITE 003

    In this course, you'll get hands-on experience configuring and managing security on Windows servers. Topics include access controls and authentication, encryption, application rules, and Group Policy objects. The course addresses security in Windows Server 2008 and Windows Server 2008 R2.

  • Securing Web Applications - ITE 004

    The Internet is an integral part of most organizations today, but this widely used public network is also the source of data theft, cyberstalking, and many other threats. Organizations with a significant Web presence, such as e-commerce sites, must ensure their Web applications are as secure as possible. This course explores managing risk in Web applications, identifying and classifying weaknesses, and strategies for developing secure Web applications.


  • All courses in the Cybersecurity Workforce Education Program are non-credit courses.
  • All courses are self-guided, with a 15-week access period to the course material.
  • Each course costs $299.
  • Course takers will take a final exam as part of the last unit of the course. A grade of 70 or higher is required to earn a course certificate indicating successful completion of the course.
  • Course labs have minimum software and system requirements.
  • These courses are not a test preparation program, but they do cover the domain areas consistent with cybersecurity certification/credentialing exams.
  • Registration for the courses above must be requested through the Registrar's Office. If you are interested in taking the non-credit Cybersecurity courses, please contact the Registrar's Office at

Need help choosing a course that is right for you? See which courses best support your professional needs.

Questions? Email us at