Close button icon
Build me a customized:
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Close button icon
Build me a customized:
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Close button icon
Build me a customized:
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

Cybersecurity

Now available in both 8-week and 14-week course formats!
This program offers a career navigation course*
Add a Cybersecurity program to prepare graduates for lucrative, impactful, and high-demand careers in cutting-edge security

The demand for Cybersecurity graduates continues to grow with 13% more Cybersecurity degree completions in the last year1.

Designed by academic and cybersecurity experts, Rize's comprehensive 8 course Cybersecurity program equips students with both the essential skills and knowledge for cybersecurity careers and sought-after professional certifications like Certified Ethical Hacker, Certified Information Systems Security Professional, and Certified Forensic Examiner. Attract and retain top-tier students with this high-demand degree.

13%
increase in Cybersecurity degree completions last year1
150k
Cybersecurity degree holders currently employed1
26%
increase in institutions with Cybersecurity graduates last year1
Courses and curriculum

Cybersecurity course descriptions

You can launch this Cybersecurity program by adding 8 Rize courses to your existing catalog, enabling you to market a Cybersecurity degree to prospective students in as little as one semester. Courses are available in both 14-week and 8-week formats.

Additionally, this program offers a career navigations course, "Career Navigation and Exploration in Cybersecurity". In this experimental 200-level course, we will help students explore career and salary outcomes, learn the skills they need to navigate the job market, and build confidence in their ability to secure an exceptional career after graduation. We’ll give them insight into what a career or job in the Cybersecurity field would actually look like day-to-day.

Expand below to read the course descriptions.

CYBER I - Introduction to Cybersecurity
Open FAQ button.

In today’s world, no one is safe from cyber-attacks, but everyone can be prepared. This course will teach you how malicious actors use social manipulation and technology to launch devastating attacks – and provide you with the tools you'll need to defend against them. Whether you pursue one of the many available jobs in cybersecurity or just want to secure your own privacy, you'll learn how to make the Internet safer.

CYBER II - Career Navigation and Exploration in Cybersecurity
Open FAQ button.

This course will help you find a job in Cybersecurity upon graduation. Not just any job; one that excites you and meets your financial needs. In this course, you will explore career paths in Cybersecurity, potential salary outcomes, and the skills you need to understand whether these salary outcomes will support you. This exploration will lead you to identify target jobs and opportunities. You will then plan the steps you need to take to achieve your goals and begin executing that plan.

CYBER III - Network and System Security
Open FAQ button.

Modern organizations know that even the strongest systems can be vulnerable to cyberattacks. As a result, jobs in cybersecurity are rapidly expanding as companies look to secure their digital assets. This course will teach you how to secure those assets by identifying and fixing potential security vulnerabilities. By the end of the course, you will be able to identify and remedy common network and systems vulnerabilities.

CYBER IV - Cybercrime and Governance
Open FAQ button.

This course explores the critical role of governance in mitigating cybercrime and ensuring the integrity of digital environments. You will learn how governments detect and stop cybercrimes, and become familiar with the laws and policies in place to deter cybercriminals. Develop and implement robust security policies procedures that align with legal and ethical standards and help create a resilient, compliant digital ecosystem.

CYBER V - Security Operations
Open FAQ button.

The moments after a breach can make or break an organization. When the unthinkable happens and a cybercrime is discovered, the actions taken by the security operations team can either contain the damage and restore order or lead to catastrophic consequences. This course examines the tools and techniques used to conduct investigations into cybercrimes and teaches the defensive skills necessary to ensure a breach doesn’t occur in the first place.

CYBER VI - Ethical Hacking
Open FAQ button.

To stop a hacker, you need to be able to think like a hacker. In this course, you will learn hands-on techniques for attacking and penetrating networks and systems. You’ll learn the tools to launch these offensive tactics, and then complete a hands-on project where you will be asked to ethically hack a real system.

CYBER VII - The Future of Cybersecurity
Open FAQ button.

Technology is racing forward, and cybersecurity must stay ahead to meet new challenges and threats. In this class, you will learn about the changing landscape of cybersecurity, emerging mobile technologies that are likely to be targeted, and new forms of cyber-attacks being launched. By the end of the course, you will be able to implement the most cutting-edge practices in cybersecurity in order to protect against attacks.

CYBER VIII - Cybersecurity Capstone
Open FAQ button.

The Capstone course is the culmination of the Cybersecurity program, allowing students to apply their knowledge to real-world challenges. Students will undertake a comprehensive project integrating various aspects of cybersecurity, including log analysis, vulnerability assessment, incident response, ethical hacking, and cloud security. This project will develop critical thinking skills and prepare students for major cybersecurity certifications.

Cybersecurity salaries and businesses
ACADEMIC ADVISORS

Rize programs leverage the courses you already have:

Our Academic Partners will work directly with you to build a unique program leveraging and integrating courses you already have in your catalog.
A potential Cybersecurity degree could look like this:
Open FAQ button.
Example courses from your institution
Business Core
Project Management
Principles of Management
Organizational Behavior
General Psychology
Courses from Rize
Rize arrow logo mark.
Introduction to Cybersecurity
Rize arrow logo mark.
Network and System Security
Rize arrow logo mark.
Cybercrime and Governance
Rize arrow logo mark.
Security Operations
Rize arrow logo mark.
Ethical Hacking
Rize arrow logo mark.
The Future of Cybersecurity
Career Navigation and Exploration in Cybersecurity
Rize arrow logo mark.
Capstone

Real-World Courses Taught by Qualified Professional & Academic Experts in the Cybersecurity Field

Each Rize program has a dedicated curriculum committee comprised of faculty & industry experts in the program's subject area.

These experts understand the needs of hiring managers in related industries to ensure courses are current and professionally relevant.

Students give these courses rave reviews

“The projects we had to do were very motivating… It sparked interest in me, got the light going in my brain - I loved doing the projects!”
Cole B.
Walsh University
“Rize has given me an opportunity to add something to my degree. Something that I wanted to find at my school but wasn’t there.”
Chisunta C.
Albertus Magnus College
“Class experience is amazing!”
Mary D.
Mary Baldwin University
“It’s helped me know what I want to do in my career because of how immersive the assignments are.”
Jacob J.
Lasell University
“Even though everything was online… it still felt like the same kind of small classroom that I really enjoy, and that’s why I chose my college - so I kinda got that same experience even thru the computer.”
Summer R.
Lasell University
"One of the things I liked about [it] was getting to meet new people from different colleges and getting to hear new experiences and opinions."
Kara B.
Lasell University

Ready to learn more?

Fill out the form below and someone from our Academic Partnerships team will be in touch with you shortly.

References

1 Gray Decision Intelligence Program Evaluation System

1 Gray Decision Intelligence Program Evaluation System
https://www.graydi.us/