Cybersecurity, Graduate Certificate offered by UNR
- Public University
- 290 acre campus
- Estd. 1874
Cybersecurity, Graduate Certificate at UNR Overview
Duration | 12 months |
Mode of learning | Online |
Official Website | Go to Website |
Course Level | UG Certificate |
Cybersecurity, Graduate Certificate at UNR Highlights
- Earn a graduate certificate from University of Nevada, Reno
Cybersecurity, Graduate Certificate at UNR Course details
- Students will be able to demonstrate an in-depth understanding of the origins, nature, and current issues in cybersecurity and its related activities using precise terminology
- Students will be able to demonstrate the ability to design, prototype and test cyberscurity solutions
- Students will be able to demonstrate the ability to work with local and regional stakeholders to identify cybersecurity risks
- Students will be able to compare and contrast international cybersecurity policies, strategies, and capabilities
- Students will be able to analyze and apply lessons from prominent international cybersecurity case studies
- The course will use an interdisciplinary approach to provide students the essential domain knowledge to address evolving cybersecurity challenges
- Students will learn to identify cybersecurity risks and to work in teams to develop appropriate, user?friendly protection and response options
- While this approach offers utility to existing cybersecurity approaches, it will be especially valuable in the creation of new approaches, especially those targeting small businesses
Cybersecurity, Graduate Certificate at UNR Curriculum
CRJ 780 - Homeland Security
demonstrate an understanding of the mission and goals of Homeland Security
analyze the development of the Department of Homeland Security and its agencies
demonstrate an understanding of the progression of Executive Orders as they relate to Homeland Security and Counter-Terrorism
articulate the roles and responsibilities of agencies under the Department of Homeland Security
discuss the different crimes and activities associated with transnational crime
distinguish the roles and responsibilities of various intelligence agencies
discuss America's vulnerabilities to cyber-attacks and cyber counter-intelligence operations
demonstrate an understanding of America's National Homeland Security framework and role of law enforcement, business and citizens
CS 701 - Introduction to Interdisciplinary Cybersecurity
apply engineering and computer science research and theory to advance the art, science, and practice of the discipline.
design and conduct experiments as well as to analyze, interpret, apply, and disseminate the data.
show an understanding of research methodology.
examine and understand cybersecurity challenges through an interdisciplinary lens
IS 670 - Computer Security, Controls, and Information Assurance
recognize and analyze primary threat scenarios of potential vulnerabilities for selected settings.
identify typical safeguards for computer-based information assets.
evaluate and explain organizational policies for information security and privacy.
propose limited risk analyses and potential organizational responses.
identify appropriate organizational structure within selected typical circumstances.
JOUR 604 - Cybersecurity, Privacy, and Surveillance Society
understand cybersecurity, privacy, and surveillance from diverse perspectives after taking this class and be able to articulate the problems and the important issues of the class topic.
learn about how to synthesize cybersecurity related theories and provide evidence. They will learn how to apply and utilize learned theories explaining the up-to-date examples.
critically assess cybersecurity issues impacting on individuals, institutions, communities, countries, and the world. Student will develop the methods of selecting high quality information.
demonstrate understanding of how to properly exercise their 4th amendment rights because the class content covers the dynamics among 4th amendment, privacy, and surveillance.
learn about discourses on the public/private information access by individuals, institutions, companies, and governments and the implications thereof.
apply their knowledge in their future decision making processes related to cybersecurity, privacy, and surveillance, from their every online activities to their professional settings
compose a term paper aimed at conference presentation or journal publication. The term paper will have in-depth literature reviews, testable hypotheses, and detailed research method
PSC 606A - Cybersecurity and International Relations
discuss the theoretical basis for how Internet technologies influence international relations
articulate how in practice international relations has been affected by Internet technologies
identify the domestic and international approaches to the challenges of Internet technologies, including: cyberwarfare, cybercrime, and cyberterrorism
demonstrate proficiency in politically analyzing cybersecurity problems through class exercises
argue for and synthesize concepts of the topic in a research paper