The campus will remain closed until 12 noon Thursday, 02/13/25. Students should log into Canvas for specific class information from their instructors. Please contact event organizers for information on specific activities. Normal operations will resume at 12pm on Thursday.

Cybersecurity

Graduate Certificate

Home » All Programs » Cybersecurity
As the digital landscape expands, the need for skilled cybersecurity professionals has never been greater.

» Program Overview

Cyber threats are becoming more sophisticated, and organizations everywhere are searching for experts who can safeguard their critical systems and data. LTU’s Graduate Certificate in Cybersecurity provides you with the knowledge and skills to tackle these challenges.

You can take this 15-credit-hour program independently or as part of Master of Business Administration (MBA) or Master of Science in Information Technology (MSIT) programs.

» Why LTU?

  • Classes are available in online, on-ground, and hybrid formats to fit the busy schedules of working professionals, with the option to complete the entire program from home.
  • Learn from expert faculty with research experience in artificial intelligence, big data, data mining, and more, providing you with advanced knowledge and skills.
  • Tackle real-world problems presented by professors with field experience, preparing you to solve today’s cybersecurity challenges.
  • Experience abundant networking opportunities by interacting with a student population employed across 130+ businesses and organizations.

Contact

Minakhi (Mina) Jena

mjena@ltu.edu
248.204.3071

» Curriculum

Foundation Course (Upto 3 Credits)

Course Name

Course #

Credits

Management Information Systems

This course introduces students to the strategic and operational uses of information systems. The use of information systems is examined for achieving and maintaining competitive advantage, as well as managerial issues concerning the development, implementation, and management of enterprise information systems. Case studies address the impact of information systems on the organization, the challenges involved in managing technological change in organizations, and the impact of emerging technologies. Students will develop a socio-technical perspective on the use of information systems to solve real-world problems.

INT6043

3

Core Courses (15 Credits)

Course Name

Course #

Credits

Advanced Computer Networking

This course provides an in-depth study of the fundamental concepts and principles in communications and computer networking. The course examines the technical, design, and management issues related to enterprise computer networking. Students will have deep knowledge and understanding of networking concepts, protocols design, and popular network technologies. Topics covered include network design and architectures, telecommunications and networking standards, approaches to scaling services, virtualization, redundancy, network security and management, data center design, hosting and cloud services, and emerging technologies and trends. The course also covers server architectures, cluster computing, grid computing, storage area networks and network attached storage, and data center design and implementation.

INT6143

3

Cybersecurity

As networks continue to grow and as computing becomes more and more ubiquitous, today’s IT Managers need to have a thorough understanding of security and the risks associated when inappropriate security exists. Students will explore basic security concepts, principles and strategy, how to develop and manage IT security program and how to strategize and plan an IT architecture. Students will also discuss other IT security issues as it relates to current market trends.

INT7223

3

Cyber Law, Policy and Ethics

This course will teach students legal and ethical issues related to the collection, analysis, preservation, and transmission of digital data. Students will
understand computer crime laws and analyze key legal cases related to cybercrimes. The course will examine the dynamic nature of the cyberspace, the impact of emerging technologies, and the legal and constitutional guidelines surrounding the use of those technologies within the cyberspace. The course will explore best practices and policies for protecting confidential and private information.

INT7233

3

Disaster Recovery and Business Continuity

Many organizations that encounter an unplanned outage can tolerate only a short amount of downtime before they experience a significant revenue loss or other adverse business impact. In the event of a security breach or natural disaster that halts day-to-day operations, organizations need to recover as quickly as possible. Not having a disaster recovery plan in place can put the organization at risk of significant financial costs, reputation loss, and unintended consequences to customers. This course prepares students to lead an organization’s disaster recovery and business continuity program development. Students will learn how to develop, implement, and evaluate a disaster recovery and business continuity program based on established industry standards. Program components include risk assessment, incident response, technical recovery, crisis management, work area recovery, and pandemic plans. Student will learn how to mitigate risk and protect vital data and physical assets. This course will cover all the subject areas specified for the EC-Council Disaster Recovery Professional (EDRP) Certification.

INT7243

3

Vulnerability Assessment and Penetration Test

This course teaches students how to identify, analyze, and understand the impact of vulnerabilities in systems, networks, and applications in order to
prevent hackers from exploiting those vulnerabilities. Through hands-on lab activities, students will learn how to perform effective penetration tests using advanced techniques, tools, and methodology that hackers utilize to attack and compromise home and corporate network environments.

INT7263

3

» Document Viewer

Use Your Cell Phone as a Document Camera in Zoom

  • What you will need to have and do
  • Download the mobile Zoom app (either App Store or Google Play)
  • Have your phone plugged in
  • Set up video stand phone holder

From Computer

Log in and start your Zoom session with participants

From Phone

  • Start the Zoom session on your phone app (suggest setting your phone to “Do not disturb” since your phone screen will be seen in Zoom)
  • Type in the Meeting ID and Join
  • Do not use phone audio option to avoid feedback
  • Select “share content” and “screen” to share your cell phone’s screen in your Zoom session
  • Select “start broadcast” from Zoom app. The home screen of your cell phone is now being shared with your participants.

To use your cell phone as a makeshift document camera

  • Open (swipe to switch apps) and select the camera app on your phone
  • Start in photo mode and aim the camera at whatever materials you would like to share
  • This is where you will have to position what you want to share to get the best view – but you will see ‘how you are doing’ in the main Zoom session.