Ethical Hacking Graduate Certificate


Program Description

The certificate for Information Assurance provides students with practical hands-on security assessment skills related to computer networks, web applications, wireless systems, and related technologies. Given the growing importance of security in every industry nationwide, the ability to assess and secure technology systems is more important than ever.

Program Eligibility

The ideal candidates for this certificate program are existing IT professionals that are looking for security content to augment their job responsibilities. Students with technology-based undergraduate degrees in Computer Science (or related) are a strong fit for this certificate program.

Program Admission

  1. A non-refundable application fee of $35, drawn on a U.S. bank, must accompany the form. The check should be made payable to Dakota State University. If the application fee is not included, the application will not be processed. The application fee cannot be waived or deferred and is non-refundable.
  2. Baccalaureate degree from an institution of higher education with full regional accreditation for that degree.
  3. Official transcripts should be mailed directly to the Graduate Office in a sealed envelope. The registrar's signature and the school seal must be across the sealed flap. Neither photocopies nor transcripts marked "student copy" are acceptable. If you have received your degree from a South Dakota Regental institution, you will not need to submit an official transcript from that university.
  4. Completed Graduate Certificate Application.


Program Delivery

All courses are delivered via distance thereby appealing to professionals regardless of location. Distance classes use a combination of both live and/or encoded streaming videos of classes, interactive course web boards, course web sites, and e-mail. All courses are web-enhanced. 

Program Requirements and Coursework

The Ethical Hacking certificate is a 9 credit hour graduate certificate. A graduate certificate will be awarded upon successful completion of the program.

  • INFA 713 Managing Security Risks 3 cr. hrs.
  • INFA 734 Web Software Security 3 cr. hrs.
  • INFA 736 Offensive Network Security 3 cr. hrs. 

Course Rotation

Courses SU 14 FA 14 SP 15 SU 15 FA 15 SP 16 SU 16 FA 16 SP 17

INFA 713

Managing Security Risks   X     X     X  

INFA 734

Web Software Security

  X     X     X  

INFA 736

Offensive Network Security   X     X     X  

Course Descriptions

INFA 713 Managing Security Risks 3 cr. hrs.

Information technology holds the potential to create strategic, operational, financial, and reputational issues for an organization. Information technology risk management science provides decision-makers with the information needed to determine information security risk so decisions can be made regarding risk mitigation. This course is a study of the existing risk management frameworks, models, processes and tools to equip students with the theory, science and practical knowledge to operationalize risk management in an organization or government agency. Topics include outsourcing and off-shoring risks, and their mitigation through third party risk management programs. Students will examine cutting-edge risk management science to understand the future of information technology risk management.

INFA 734 Web Software Security 3 cr. hrs.

This course provides in-depth knowledge of current vendor-independent web application hacking techniques and the defensive programming approaches necessary to mitigate such attacks. Attacks and mitigation strategies related to filter evasion, session management, database interaction, path traversal, and file inclusion will be emphasized.

INFA 736 Offensive Network Security 3 cr. hrs.

This course provides theoretical and practical aspects of Network Penetration Testing. The course includes in-depth details and hands on labs for each of the five distinct phases of an ethical hack including reconnaissance, scanning and vulnerability assessment, gaining access and exploitation, maintaining access, and covering tracks. An applied approach with a focus on current tools and methodologies will be stressed.

 

 
Request Information


Last Updated: 3/19/14