Cybersecurity
The Rize Cybersecurity program prepares students for modern security careers through hands-on projects, real-world tools, and no-code approaches. With a focus on simulated threat scenarios and industry-relevant practices, students gain practical experience that translates directly to in-demand roles. The curriculum is updated annually to ensure graduates develop the skills employers need in today’s evolving security landscape.
Cybersecurity
Courses
Introduction to Cybersecurity
In today’s world, no one is safe from cyber-attacks, but everyone can be prepared. This course will teach you how malicious actors use social manipulation and technology to launch devastating attacks – and provide you with the tools you'll need to defend against them. Whether you pursue one of the many available jobs in cybersecurity or just want to secure your own privacy, you'll learn how to make the Internet safer.
Career Navigation and Exploration in Cybersecurity
This course will help you find a job in Cybersecurity upon graduation. Not just any job; one that excites you and meets your financial needs. In this course, you will explore career paths in Cybersecurity, potential salary outcomes, and the skills you need to understand whether these salary outcomes will support you. This exploration will lead you to identify target jobs and opportunities. You will then plan the steps you need to take to achieve your goals and begin executing that plan.
Security Operations
The moments after a breach can make or break an organization. When the unthinkable happens and a cybercrime is discovered, the actions taken by the security operations team can either contain the damage and restore order or lead to catastrophic consequences. This course examines the tools and techniques used to conduct investigations into cybercrimes and teaches the defensive skills necessary to ensure a breach doesn’t occur in the first place.
Cybercrime and Governance
This course explores the critical role of governance in mitigating cybercrime and ensuring the integrity of digital environments. You will learn how governments detect and stop cybercrimes, and become familiar with the laws and policies in place to deter cybercriminals. Develop and implement robust security policies procedures that align with legal and ethical standards and help create a resilient, compliant digital ecosystem.
Network and System Security
Modern organizations know that even the strongest systems can be vulnerable to cyberattacks. As a result, jobs in cybersecurity are rapidly expanding as companies look to secure their digital assets. This course will teach you how to secure those assets by identifying and fixing potential security vulnerabilities. By the end of the course, you will be able to identify and remedy common network and systems vulnerabilities.
Ethical Hacking
To stop a hacker, you need to be able to think like a hacker. In this course, you will learn hands-on techniques for attacking and penetrating networks and systems. You’ll learn the tools to launch these offensive tactics, and then complete a hands-on project where you will be asked to ethically hack a real system.
The Future of Cybersecurity
Technology is racing forward, and cybersecurity must stay ahead to meet new challenges and threats. In this class, you will learn about the changing landscape of cybersecurity, emerging mobile technologies that are likely to be targeted, and new forms of cyber-attacks being launched. By the end of the course, you will be able to implement the most cutting-edge practices in cybersecurity in order to protect against attacks.
Cybersecurity Capstone
The Capstone course is the culmination of the Cybersecurity program, allowing students to apply their knowledge to real-world challenges. Students will undertake a comprehensive project integrating various aspects of cybersecurity, including log analysis, vulnerability assessment, incident response, ethical hacking, and cloud security. This project will develop critical thinking skills and prepare students for major cybersecurity certifications.
Student Outcomes
Learning Outcomes
- Develop and implement security plans to safeguard data against attacks by applying industry-standard frameworks for threat detection.
- Construct and deploy security controls and countermeasures in network and system environments to protect systems from common attacks.
- Develop and implement robust security policies, procedures, and emergency measures that comply with legal and governmental requirements and protect individual rights.
- Conduct incident investigations using modern forensic tools and execute response and recovery plans to minimize the impact of security events.
- Develop and execute ethical hacking strategies, utilizing industry-standard tools and techniques to discover vulnerabilities within networks and systems.
- Develop and deploy monitoring systems to detect and respond to emerging cyber threats and vulnerabilities, with a focus on mobile and cloud security strategies.
- Identify career opportunities through frameworks that evaluate fulfillment and financial health.
- Build a plan for securing opportunities, using empathy and professionalism to maximize chances of success.
- Analyze complex cybersecurity challenges, evaluate potential solutions, and implement effective strategies to mitigate risks and protect against threats.
Certifications
- CompTIA Security+
Students who complete the program will cover all examined material. The IT and programming courses below are recommended for the additional coverage and practice they would provide.
- Certified Ethical Hacker
The Ethical Hacking course would cover penetration testing and attack detection and prevention in sufficient depth to qualify students for CEH.
- GIAC Security Essentials Certification (GSEC)
The program provides the necessary background in information systems and networking, including active defense, network security, cryptography, incident response, and cloud security.
Disclosure
This program includes courses delivered online through an institution of the Lower Cost Models Consortium (LCMC), however all academic credit applies toward the degree requirements at your degree-granting institution.