Online Undergraduate Certificate in Cyber Security
As the digital world expands, maintaining cybersecurity becomes ever more critical to businesses and their customers. At DeVry University our 100% online Cyber Security Certificate program can help prepare you to become a cyber defender, securing sensitive data and protecting organizations against data breaches.
If you enjoy all things tech, completing an online cyber security certificate program can help you develop fundamental cyber security skills for combating cybercrime. The courses in this program will teach you how to design strategies to protect information, infrastructure and brands against the threat of cyberattacks.
Courses within our curriculum may also help you prepare to pursue industry-relevant cyber security certifications like:
- CompTIA A+ - A certification gained after passing two exams designed by IT professionals. This certification focuses on troubleshooting, hardware, operating systems and networks.
- CompTIA Cloud+ - A globally recognized certification that confirms an individual's ability to troubleshoot, set up and manage cloud computing systems in a secure fashion.
- CompTIA LINUX+ - A certification designed for professionals that use the Linux operating system to manage networks and devices. This is particularly useful for carefully managing each aspect of a system or network.
- CompTIA NETWORK+ - This certification verifies a recipient's knowledge of emerging technologies such as the cloud. It is recommended for IT and cybersecurity professionals who wish to remain on the cutting edge of network developments.
- CompTIA PenTest+ - Cyber security professionals might consider pursuing this certification to confirm that they can monitor the vulnerability of networks. It focuses on verifying offensive capabilities that you can use to test the security level of existing networks and data archives.
- CompTIA Security+ - This certification and exam confirm a recipient's possession of the skills needed to perform basic cyber security functions.
- EC Council Certified Ethical Hacker – This certification indicates that the holder knows how to look for and identify weaknesses in networks and computer systems.
- EC Council Certified Network Defender – This certification is designed to verify an individual's ability to create secure networks that are protected from a variety of threats.
Earn your undergraduate certificate program in cyber security in as little as 1 year and 4 months1—or even more quickly with qualifying transfer credits.
Whether you’re looking to advance in your current cybersecurity role, or you’d like to venture into a new career path, it all starts with a simple conversation.
Want to get started?
100% Online Cyber Security Certificate classes start January 2, 2023.
Quick Facts
How long is the Cyber Security Certificate Program?
- 14 courses
- 40 credit hours
- Can be completed in 1 year and 4 months1—or even more quickly with qualifying transfer credits.
Online Cyber Security Certificate Program - What You Can Learn
This program helps you develop the essential skills needed to be a strategic data defender capable of protecting an organization from highly disruptive cyberattacks. DeVry’s Online Cyber Security Certificate covers the following:

Strategies to Safeguard Networks and Systems
Learn about assessing threats, developing countermeasures, protecting information and designing security processes and performing audits used to verify compliance with policies and procedures.

Information Assurance Policies
Learn the measures that protect and defend information and information systems by ensuring their availability, integrity and confidentiality using principles of authentication and non-repudiation.

Ethical Hacking As a Means of Selecting and Systematically Investigating Systems
Gain knowledge and skills related to activities behind hacking attacks and countermeasures. Learn to build defense mechanisms to protect applications, systems and networks from hackers.

Small Enterprise Networks
Produce, secure, operate and troubleshoot small enterprise networks by gaining an understanding of the underlying technology of networks and the internet.

OS Concepts
Install and configure operating systems using Command Line Interface (CLI).
Students must place in MATH062 & ENGL062 or above. To begin program coursework, students must complete transitional studies courses first, if applicable.2
Cyber Security Certificate and Financial Aid
Our commitment to educational affordability is one of the many ways we strive to help you pursue your Cyber Security Certificate. During the 2020-2021 award year, DeVry University has assisted students by awarding more than $57 Million in student financial assistance3 through partner tuition savings, institutional scholarships and university grants.
Job Opportunities in the Cyber Security Field
More and more, people are rethinking the way they go about their education and career planning. Many times, an undergraduate certificate can be a way to kick-start your future in cyber security.
A certificate in cyber security is an option for anyone who currently works in the tech field and wants to expand their knowledge in the cyber security niche. It may also be a great solution for someone who is looking to break into the industry for the first time, but may not have time to complete a bachelor's degree program.
Graduates with our Undergraduate Certificate in Cyber Security may find themselves prepared for entry-level opportunities such as:
- Network Systems Administrator
A network systems administrator role requires many skills, but primarily focuses on maintaining computer networks and systems. These systems may include local area networks (LANs), wide area networks (WANs) and virtual private networks (VPNs). They install, configure and troubleshoot switches, routers, wireless access points and other physical hardware to ensure network security and functionality.
- Information Security Analyst
Information security analysts are a first line of defense in protecting an organization’s data. They ensure that information is kept confidential, accurate and available through a combination of policies, procedures and technical measures. People in this profession are responsible for analyzing the flow of data and identifying weaknesses where breaches could occur. Once a breach point has been identified, it can be rectified prior to a network intrusion.
- Cyber Security Analyst
A cyber security analyst is responsible for protecting a company's network and systems. Reviewing suspicious activities and reporting of breaches are a priority, as is educating employees on security measures. Cyber security analysts focus on protecting technology and data stored in electronic form, while information security analysts focus on protecting all forms of information. Because cyber security analysts often have to educate fellow employees on protocols, it helps to have solid communication skills and the ability to convey complex concepts using simple language.
- Cyber Security Specialist
A cyber security specialist handles a variety of security-related tasks. Some of these tasks are:
- Analyzing risks and developing protective strategies
- Monitoring for and responding to security breaches
- Installing and maintaining firewall, encryption software and other defensive measures
- Simulating attacks to detect vulnerabilities
This is a broad title that is used less often today as security roles have become more specialized, however, smaller organizations may hire a cyber security specialist as a sort of "all-in-one" professional.
- Analyzing risks and developing protective strategies
- Cyber Security Technician
A cyber security technician, also known as a cyber security engineer, designs and supports information security plans and assists in implementing the strategy. They often work alongside IT professionals to help design secure networks and protocols for employees.
- Computer User Support Specialist
A computer user support specialist, also known as help desk support specialists or technicians, will work directly with individual employees to assist with computer problems. They specialize in translating jargon into simpler terms to diagnose a computer problem since most of the people they encounter do not have a background in IT. A cyber security certificate and background is valuable for this position as many people lack a complete understanding of how to protect their data in this ever-changing technology landscape.
Future Cyber Defenders Scholars Program
Take your ambition to the next level with a cybersecurity scholars program that helps you build your network, boost your skills and pursue the career you want.
Program Courses
Mathematics
MATH114 | Algebra for College Students |
Tech Core
CEIS101C | Introduction to Technology and Information Systems |
CEIS106 | Introduction to Operating Systems |
CEIS110 | Introduction to Programming |
CEIS114 | Introduction Digital Devices |
NETW191 | Introduction to Information Technology & Networking |
NETW211 | Fundamentals of Cloud Computing |
SEC285 | Fundamentals of Information Security |
Cyber Security
SEC290 | Fundamentals of Infrastructure Security |
SEC310 | Principles and Theory of Security Management |
SEC311 | Ethical Hacking |
SEC321 | Network Security Testing with Lab |
Career Preparation
CEIS299 | Careers and Technology |
CEIS499 | Preparation for the Profession |
DeVry University’s Cyber Security curriculum is acknowledged and verified as an approved provider by NICCS.
Cyber Security FAQs
What is cyber security?
Cyber security, also known as computer security or information technology security, is the set of practices and processes put in place for the protection of computer systems and networks. It protects institutions from the theft of or damage to their hardware, software or electronic data as well as any disruption or misdirection of services. While cyber security has always been important, the highly online nature of business in the modern era has made it a necessity.
What can you do with a cyber security certificate?
What kind of jobs can you get with a cyber security certificate?
What are the benefits of cyber security?
How do cyber security programs differ from one another?
Why do you need a cyber security certification?
"I can't be grateful enough, I love DeVry! I love my professors! I love the way my class opened my perspective about life a whole lot wider just from my math class. DeVry's career pathway is so motivating that I feel I have a clearer direction towards the future. I am so blessed too with how DeVry made it possible for me to pursue schooling, financially. Without the current payment plan, I would not have been able to start. I love the curriculum. It is fast paced but so far so good. I appreciate having a Career Services Advisor."
Build Skills with Stackable Degrees
Earn a Credential at Every Step
You don’t need to wait four years to add a credential to your resume. At DeVry, many programs are designed to stack — allowing you to work towards your education goals at your own pace. Start with a shorter credential that takes less time, such as an Undergraduate Certificate in Cyber Security.
These credentials are gained through flexible online and on-site classes that help you build your professional skills right away. Best of all, every course counts toward the next degree level5
How Do Credentials Stack?
Our online Cyber Security Certificate program can serve as a building block to our Associate Degree in Cybersecurity and Networking. When you complete the associate, all courses are designed to stack into our Bachelor’s in Information Technology and Networking with a specialization in Cyber Security.*
Academic Catalog
Download PDFProgram Overview
Download PDFAcademic Catalog
Download PDFProgram Overview
Download PDFRelated Programs
1Not including breaks. Assumes year-round, full-time enrollment.
2Transitional studies coursework may affect program length and cost.
3Data is inclusive of all partner tuition savings, institutional scholarships and grants for the period for July 1, 2020 to June 30, 2021.
4https://www.bls.gov/ooh/computer-and-information-technology/information-security-analysts.htm. Growth projected on a national level. Local growth may vary by location
5At the time of application to the next credential level, an evaluation of qualifying transfer credit will occur and the most beneficial outcome will be applied.
*The figures displayed represent the minimum credit hours required for graduation. At the time of application to the next credential level, an evaluation of qualifying transfer credit will occur and the most beneficial outcome will be applied.