Twitter wdigets
Professional Development, University Extended Education, California State University, Fullerton

man locks for security

Cyber Security Analysis

Our Cyber Security Analysis Certificate program is designed to give you the knowledge, skills and experience to perform the tasks of a security analyst.

The demand for cyber security experts has never been greater, as a growing number of corporations, government agencies and private companies are transferring and storing highly sensitive information on the internet, in the cloud or via other electronic methods that are vulnerable to attacks from hackers.

According to the U.S. Bureau of Labor Statistics, employment in the field is expected to grow by 37% by 2022, with an annual median income of $86,170 (as of May 2012). Although many jobs are available, employers are seeking candidates with a certain amount of experience with the tools and procedures associated with the job.

In this program, you will learn many of those tools and procedures, including:

  • The Deter, Detect, Respond, Remediate (DDRR) operating model
  • The laws and regulations regarding computer security in the United States
  • Use of the core tools and technologies used by professionals to analyze cyber-attacks, with a heavy focus on the packet-analysis tool Wireshark, as well as the log analysis tool Splunk
  • How to use a hex editor, as well as some data decoding tools
  • How to write basic programs to automate processes.

In our Cyber Security Analysis program, you will spend 98 hours in a combination of lectures, discussions and hands-on learning opportunities to build up the skillset and experience you’ll need to address the most complex cyber security problems. 9.8 Continuing Education Units will be awarded to certificate graduates.

Non-California Residents

Due to state and federal regulations, non-California residents may only enroll in CSUF online courses when their state has authorized CSUF as a provider. Click here for more information.

It is recommended that participants who reside outside of United States and whose first language is not English must possess English language proficiency equivalent to a minimum TOEFL score of 550 (paper), 80 (iBT) or IELTS score of 6.5.

It is the participant’s responsibility to demonstrate English language proficiency necessary to fully participate in the class lectures and discussions.

  • Modern computer running Microsoft Windows 7/10 or Mac OS X.
  • High-speed internet connection
  • Microphone and Camera
  • 50GB of free space available
  • Minimum 8GB of RAM
  • i5 or i7 processor
For optimal viewing of the course schedule below, please view on a tablet or desktop
Please note: Note: Click on the course title to view all available course sections. Hover over the colored labels to view where the course will be offered.
Course Title
Winter / Spring 2018

No sections available. View the course description.

Notify Me

No sections available. View the course description.

Notify Me

No sections available. View the course description.

Notify Me

No sections available. View the course description.

Notify Me

Upon completion of the certificate program, graduates will be able to:
-Research and identify laws and regulations applicable to computer security in the United States
-Apply logical tests to ensure activities are ethical and in compliance with laws, regulations, and contracts
-Understand the two primary frameworks that help guide organizations in the creation and maintenance of programs to remain in compliance
-Apply the Deter, Detect, Respond, Remediate (DDRR) operating model
-Report findings and propose solutions with cost and priority considered
-Write basic programs to automate processes
-Use packet analysis tools, log analysis tools, hex editors, and data decoding tools to conduct cyber security analysis
-Triage real-world alert queues by prioritizing the importance of the work based on risk assessments

The Advisory Board defined the certificate program audience as:
-Information technology professionals seeking to expand knowledge
-Law enforcement and investigative professionals
-Individuals with computer science backgrounds seeking to enter the field
-Professionals interested in a career transition into the information security field

Although there are no prerequisites for this program, individuals are recommended to have a working knowledge of information technology or computer programming to meet the demands of this class.

Candy Alexander
Chief Architect, ISSA's Cyber Security Career Lifecycle, GRC Security Consultant, Virtual CISCO
Terry Gold
Industry Security Analyst, Co-Founder, Security B-Sides Orange County; Program Director, ISSA Orange County
Kari A Knutson Miller
Dean, University Extended Education; Associate Vice President, International Programs, California State University Fullerton
Sandra Lambert
Founder, ISSA; Director, Lambert & Associates Information Security & Business Consulting Services
Christopher P Pavan
Computer Incident Response Team Senior Analyst, Bechtel Corporation
Kris Rides
Founder, Tiro Security; Information Security Networker, Infosec Staffing; Founder, Cloud Security Alliance LA
Eric Santa Ines
Program Developer, University Extended Education, California State University, Fullerton
Michael M Shafae
Computer Science Department Chair, Associate Professor of Computer Science, California State University, Fullerton
Marco Tietz
Senior Manager Security and Compliance, Intuit; President, Cloud Security Alliance LA
Shelly Wang
Manager, Program Development, University Extended Education, California State University, Fullerton

Program Details

Location: Online
Length: 8-10 months
Cost: $4,000*
Next Start: TBA

Join the Cyber Security email list for updates.

Contact Us

Request a Certificate

* Cost is approximate and subject to change