{"id":3669,"date":"2019-11-27T12:20:53","date_gmt":"2019-11-27T17:20:53","guid":{"rendered":"https:\/\/web.uri.edu\/online\/?page_id=3669"},"modified":"2026-03-26T15:51:41","modified_gmt":"2026-03-26T19:51:41","slug":"curriculum","status":"publish","type":"page","link":"https:\/\/web.uri.edu\/online\/programs\/certificate\/cybersecurity\/curriculum\/","title":{"rendered":"Cyber Security Curriculum"},"content":{"rendered":"\n<h1 class=\"wp-block-heading\">Cyber Security Graduate Certificate<\/h1>\n\n\n<section class=\"cl-wrapper cl-menu-wrapper\"><nav id=\"\" class=\"cl-menu  \" data-name=\"Cyber Security Certificate\" data-show-title=\"0\"><ul id=\"menu-cyber-security-certificate\" class=\"cl-menu-list cl-menu-list-no-js\"><li id=\"menu-item-3673\" class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-3673\"><a href=\"https:\/\/web.uri.edu\/online\/programs\/certificate\/cybersecurity\/\">Overview<\/a><\/li>\n<li id=\"menu-item-3675\" class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-3675\"><a href=\"https:\/\/web.uri.edu\/online\/programs\/certificate\/cybersecurity\/curriculum\/\">Curriculum<\/a><\/li>\n<li id=\"menu-item-4541\" class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-4541\"><a href=\"https:\/\/web.uri.edu\/online\/programs\/certificate\/cybersecurity\/admission\/\">Admission<\/a><\/li>\n<li id=\"menu-item-29748\" class=\"menu-item menu-item-type-post_type menu-item-object-page menu-item-29748\"><a href=\"https:\/\/web.uri.edu\/online\/discover-uri-online\/\">Discover URI Online<\/a><\/li>\n<\/ul><\/nav><\/section>\n\n\n\n<h2 class=\"wp-block-heading\">Curriculum<\/h2>\n\n\n\n<p>In order to complete a Graduate Certificate in Cyber Security, students must complete four courses. Available courses are sorted into three course groups: starting core courses, mandatory core courses, and concentration courses.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Starting Core Course<\/h3>\n\n\n\n<p>CSF 432 \u2013 Introduction to Network and Systems Security (fall; 4 credits)&nbsp;must be taken before students can take any additional courses. This course can be taken in conjunction with CSF 430 \u2013 Introduction to Information Assurance, but can not be taken in conjunction with any other courses.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Mandatory Core Courses<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>CSF 430 \u2013 Introduction to Information Assurance (fall; 4 credits)<\/li>\n\n\n\n<li>CSF 534 \u2013 Advanced Topics in Network and System Security (spring; 4 credits)<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Concentration Courses<\/h3>\n\n\n\n<p>Students must take one additional course from the concentration courses to complete their certificate program. These courses must be taken after completion of the starting core course, however can be taken in any order. Students can choose to take these courses before, after, or in conjunction with courses from the mandatory courses as long as all course prerequisites are met.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>CSF 524 \u2013 Advanced Incident Response (spring; 4 credits)<\/li>\n\n\n\n<li>CSF 536 \u2013 Advanced Intrusion Detection and Defense (fall; 4 credits)<\/li>\n\n\n\n<li>CSF 538 \u2013 Penetration Testing (summer; 4 credits)<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Sample Options and Completion Times<\/h3>\n\n\n\n<p>There are many options available for students to complete the Graduate Certificate in Cyber Security, below are some sample options and how long they take to complete.<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><th>&nbsp;<\/th><th>Year 1<\/th><th>Year 2<\/th><\/tr><tr><td>&nbsp;<\/td><td>Fall<\/td><td>Spring<\/td><td>Summer<\/td><td>Fall<\/td><td>Spring<\/td><td>Complete<\/td><\/tr><tr><td>Opt. 1<\/td><td>CSF 430 &amp; CSF 432<\/td><td>CSF 534 &amp; CSF 524<\/td><td>&nbsp;<\/td><td>&nbsp;<\/td><td>&nbsp;<\/td><td>9 months<\/td><\/tr><tr><td>Opt. 2<\/td><td>CSF 430 &amp; CSF 432<\/td><td>CSF 534<\/td><td>CSF 538<\/td><td>&nbsp;<\/td><td>&nbsp;<\/td><td>12 months<\/td><\/tr><tr><td>Opt. 3<\/td><td>CSF 432<\/td><td>CSF 534<\/td><td>CSF 538<\/td><td>CSF 430<\/td><td>&nbsp;<\/td><td>16 months<\/td><\/tr><tr><td>Opt. 4<\/td><td>CSF 432<\/td><td>CSF 534<\/td><td>&nbsp;<\/td><td>CSF 430 &amp; CSF 536<\/td><td>&nbsp;<\/td><td>16 months<\/td><\/tr><tr><td>Opt. 5<\/td><td>CSF 432<\/td><td>CSF 534<\/td><td>&nbsp;<\/td><td>CSF 430<\/td><td>CSF 524<\/td><td>20 months<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\"><a class=\"cl-button   prominent\" href=\"https:\/\/gradadmissions.uri.edu\/apply\/\" title=\"\">apply now<\/a><\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\"><a class=\"cl-button   prominent\" href=\"https:\/\/www.uri.edu\" title=\"\">Prominent<\/a><\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\"><a class=\"cl-button   prominent\" href=\"https:\/\/web.uri.edu\/online\/programs\/certificate\/cybersecurity\/admission\/\" title=\"\">admission<\/a><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Cyber Security Graduate Certificate Curriculum In order to complete a Graduate Certificate in Cyber Security, students must complete four courses. Available courses are sorted into three course groups: starting core courses, mandatory core courses, and concentration courses. Starting Core Course CSF 432 \u2013 Introduction to Network and Systems Security (fall; 4 credits)&nbsp;must be taken before [&hellip;]<\/p>\n","protected":false},"author":3255,"featured_media":0,"parent":174,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":"","_links_to":"","_links_to_target":""},"class_list":["post-3669","page","type-page","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/web.uri.edu\/online\/wp-json\/wp\/v2\/pages\/3669","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/web.uri.edu\/online\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/web.uri.edu\/online\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/web.uri.edu\/online\/wp-json\/wp\/v2\/users\/3255"}],"replies":[{"embeddable":true,"href":"https:\/\/web.uri.edu\/online\/wp-json\/wp\/v2\/comments?post=3669"}],"version-history":[{"count":5,"href":"https:\/\/web.uri.edu\/online\/wp-json\/wp\/v2\/pages\/3669\/revisions"}],"predecessor-version":[{"id":34211,"href":"https:\/\/web.uri.edu\/online\/wp-json\/wp\/v2\/pages\/3669\/revisions\/34211"}],"up":[{"embeddable":true,"href":"https:\/\/web.uri.edu\/online\/wp-json\/wp\/v2\/pages\/174"}],"wp:attachment":[{"href":"https:\/\/web.uri.edu\/online\/wp-json\/wp\/v2\/media?parent=3669"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}