The demand for Cybersecurity graduates continues to grow with 13% more Cybersecurity degree completions in the last year1.
Designed by academic and cybersecurity experts, Rize's comprehensive 8 course Cybersecurity program equips students with both the essential skills and knowledge for cybersecurity careers and sought-after professional certifications like Certified Ethical Hacker, Certified Information Systems Security Professional, and Certified Forensic Examiner. Attract and retain top-tier students with this high-demand degree.
You can launch this Cybersecurity program by adding 8 Rize courses to your existing catalog, enabling you to market a Cybersecurity degree to prospective students in as little as one semester. Courses are available in both 14-week and 8-week formats.
Additionally, this program offers a career navigations course, "Career Navigation and Exploration in Cybersecurity". In this experimental 200-level course, we will help students explore career and salary outcomes, learn the skills they need to navigate the job market, and build confidence in their ability to secure an exceptional career after graduation. We’ll give them insight into what a career or job in the Cybersecurity field would actually look like day-to-day.
Expand below to read the course descriptions.
In today’s world, no one is safe from cyber-attacks, but everyone can be prepared. This course will teach you how malicious actors use social manipulation and technology to launch devastating attacks – and provide you with the tools you'll need to defend against them. Whether you pursue one of the many available jobs in cybersecurity or just want to secure your own privacy, you'll learn how to make the Internet safer.
This course will help you find a job in Cybersecurity upon graduation. Not just any job; one that excites you and meets your financial needs. In this course, you will explore career paths in Cybersecurity, potential salary outcomes, and the skills you need to understand whether these salary outcomes will support you. This exploration will lead you to identify target jobs and opportunities. You will then plan the steps you need to take to achieve your goals and begin executing that plan.
Modern organizations know that even the strongest systems can be vulnerable to cyberattacks. As a result, jobs in cybersecurity are rapidly expanding as companies look to secure their digital assets. This course will teach you how to secure those assets by identifying and fixing potential security vulnerabilities. By the end of the course, you will be able to identify and remedy common network and systems vulnerabilities.
This course explores the critical role of governance in mitigating cybercrime and ensuring the integrity of digital environments. You will learn how governments detect and stop cybercrimes, and become familiar with the laws and policies in place to deter cybercriminals. Develop and implement robust security policies procedures that align with legal and ethical standards and help create a resilient, compliant digital ecosystem.
The moments after a breach can make or break an organization. When the unthinkable happens and a cybercrime is discovered, the actions taken by the security operations team can either contain the damage and restore order or lead to catastrophic consequences. This course examines the tools and techniques used to conduct investigations into cybercrimes and teaches the defensive skills necessary to ensure a breach doesn’t occur in the first place.
To stop a hacker, you need to be able to think like a hacker. In this course, you will learn hands-on techniques for attacking and penetrating networks and systems. You’ll learn the tools to launch these offensive tactics, and then complete a hands-on project where you will be asked to ethically hack a real system.
Technology is racing forward, and cybersecurity must stay ahead to meet new challenges and threats. In this class, you will learn about the changing landscape of cybersecurity, emerging mobile technologies that are likely to be targeted, and new forms of cyber-attacks being launched. By the end of the course, you will be able to implement the most cutting-edge practices in cybersecurity in order to protect against attacks.
The Capstone course is the culmination of the Cybersecurity program, allowing students to apply their knowledge to real-world challenges. Students will undertake a comprehensive project integrating various aspects of cybersecurity, including log analysis, vulnerability assessment, incident response, ethical hacking, and cloud security. This project will develop critical thinking skills and prepare students for major cybersecurity certifications.
1 Gray Decision Intelligence Program Evaluation System
https://www.graydi.us/