Cybersecurity
Diploma Program

Request more information

Message Received!
Thank you for reaching out to us. We will review your message and get right back to you within 24 hours.

If there is an urgent matter and you need to speak to someone immediately you can call at the following phone number:

By clicking the Send me more information button above, I represent that I am 18+ years of age, that I have read and agreed to the Terms & Conditions and Privacy Policy, and agree to receive email marketing and phone calls from UOTP. I understand that my consent is not required to apply for online degree enrollment. To speak with a representative without providing consent, please call +1 (202) 274-2300

Reach your career goals with a cybersecurity diploma program

Diploma programs provide professional and/or technical skills for career transition in a wide variety of public and private business sectors. These programs are intended for those who have an interest in gaining additional knowledge for career transition or licensure.

Location On-Campus Online
Washington, DC
Virginia
Chicago
COST FOR PROGRAM

MSCHE Accredited

Our program follows best-practice standards for business education.

Real-World Practitioners

Learn from experienced business professionals.

Convenient Classes

Take a class online or
on-site -- it's your choice.

Cyber Security Diploma Program Overview

The Cyber Security program provides training for an entry-level career in Cyber Security industry. The program will focus on security information, procedures and processes used in all types of business, governmental, non-profit environments. The program includes training in security basics, networks basics and defense, identity and access management, cryptography concepts, system administration, logging and monitoring, programming, web security, project management, and threats and vulnerabilities.
Adityah Singh

Adityah Singh

Principal Business Data Analyst

Potomac is more than an education. The university provides better career prospects, valuable employability skills, personal development and a world of opportunity.

This Program Is Accredited By

Cyber Security Courses & Curriculum

To receive a Medical Assistant Diploma, students must earn 46 semester credit hours. Unless noted otherwise, all courses carry three semester credits hours. Program requirements are listed below.

Program Outline

Computer Support Specialist graduate, existing CompTIA Network+ certification, or passing readiness test is required to start this program.

Students are required to participate in the final group project as an active member of the team. Daily evaluations are done as to their involvement in the final projects. Additionally, students must complete an individual project on a topic of their choosing. The project may include many different aspects of network attack and defense. The program requires a PC running Windows 7 or newer with a minimum of 8GB of RA

Complete Listing of Subjects & Synopsis

Subject Identifying Number: Week 1-2

Lecture Hours: 20

Lab Hours: 20

Total Hours: 40

Prerequisites: Admission to course

Synopsis: The Security Basics course will help students gain a fundamental understanding of security concepts that will be used throughout the Cyber Security track. Topics covered include basic security concepts.

Subject Identifying Number: Week 3-4

Lecture Hours: 20
Lab Hours: 20
Total Hours: 40

Prerequisites: Weeks 1-2

Synopsis: The course will cover System Administration basics from a security orientated point of view. This course will include information on installing and configuring network components to support organizational security. Additional topics include threats.

Subject Identifying Number: Week 5-6

Lecture Hours: 20
Lab Hours: 20
Total Hours: 40

Prerequisites: Weeks 3-4

Synopsis: This course will provide instruction in technical skills required in network administration and support. This course will include information on media.

Subject Identifying Number: Week 7-8

Lecture Hours: 20
Lab Hours: 20
Total Hours: 40

Prerequisites: Weeks 4-5

Synopsis: The Network Defense course will give students an overview of the various hardware and software tools available to defend a network against attack. Students will use various tools to assess the security posture of an organization and understand the possible impact of threats.

Subject Identifying Number: Week 9-10

Lecture Hours: 20
Lab Hours: 20
Total Hours: 40

Prerequisites: Weeks 7-8

Synopsis: The course will cover the different methodologies and concepts of Cryptography and Access management. Students will be exposed to different cryptography algorithms used to ensure safe transmission, storage and use of sensitive data. Students will also

Subject Identifying Number: Week 11-12

Lecture Hours: 20
Lab Hours: 20
Total Hours: 40

Prerequisites: Weeks 9-10

Synopsis: The course will give students the knowledge and skills needed to properly analyze and interpret various security related logs produced by different security related technologies. This will focus on standard logs and in particular on Intrusion Detection and Prevention.

Subject Identifying Number: Week 13-14

Lecture Hours: 20
Lab Hours: 20
Total Hours: 40

Prerequisites: Weeks 11-12

Synopsis: The Programming Foundations course will give students a foundation in one of the most popular programming languages in use today, generally a widely used high-level programming language for general-purpose programming. This module will give students a strong foundation upon which to build throughout the rest of the track. 

Subject Identifying Number: Week 15-16

Lecture Hours: 20
Lab Hours: 20
Total Hours: 40

Prerequisites: Weeks 13-14

Synopsis: The Web Application Security course is intended to be an introduction to the key concepts of Web Security. Students will learn the mindset, discipline, and methods for securing a software project. This course is designed to be useful and accessible to application developers, QA testers, operations teams, and leadership who want to understand how to have conversations and make decisions around application security.

Subject Identifying Number: Week 17-18

Lecture Hours: 20
Lab Hours: 20
Total Hours: 40

Prerequisites: Weeks 15-16

Synopsis: This course covers the Agile software development methodology in use in many teams in the software industry today. Students will learn the different roles on an Agile team.

Subject Identifying Number: Week 19-20

Lecture Hours: 20
Lab Hours: 20
Total Hours: 40

Prerequisites: Weeks 16-17

Synopsis: The Threats and Vulnerabilities course will provide students with an in depth look at the various threats and vulnerabilities faced by every organization and technology user. 

Subject Identifying Number: Week 21-24

Lecture Hours: 20
Lab Hours: 20
Total Hours: 40

Prerequisites: Weeks 19-20

Synopsis: Students will learn to complete an analysis of network defense in a group setting. 

Total Hours for Course Completion

Lecture: 200 / Lab: 280 / Total: 480

Diploma Program Requirements & Outcomes

After completing this course, students will be able to:

  • Use network assessment tools to gauge the security posture of an organization
  • Implement access management controls and account management practices
  • Identify, compare, and contrast different types of attacks and related impacts
  • Use a programming language to automate system administration tasks
  • Use theoretical models and specific technical knowledge to secure web applications

This program is delivered by CLASSROOM BASED INSTRUCTION or ONLINE COMPUTER BASED LEARNING

 

Request FREE Information

Want to learn more about University of the Potomac?Complete the simple form – it just takes a minute!

This will only take a moment.

Message Received!
Thank you for reaching out to us. We will review your message and get right back to you within 24 hours.

If there is an urgent matter and you need to speak to someone immediately you can call at the following phone number:

By clicking the Send me more information button above, I represent that I am 18+ years of age, that I have read and agreed to the Terms & Conditions and Privacy Policy, and agree to receive email marketing and phone calls from UOTP. I understand that my consent is not required to apply for online degree enrollment. To speak with a representative without providing consent, please call +1 (202) 274-2300

Request FREE Information

Want to learn more about University of the Potomac?
Complete the simple form – it just takes a minute!

  • Invest in yourself by finishing your degree.

  • Take classes online, on campus, or both.

  • Finish faster. Save more.

This will only take a moment.

Message Received!
Thank you for reaching out to us. We will review your message and get right back to you within 24 hours.

If there is an urgent matter and you need to speak to someone immediately you can call at the following phone number:

By clicking the Send me more information button above, I represent that I am 18+ years of age, that I have read and agreed to the Terms & Conditions and Privacy Policy, and agree to receive email marketing and phone calls from UOTP. I understand that my consent is not required to apply for online degree enrollment. To speak with a representative without providing consent, please call +1 (202) 274-2300

Hear What Our Graduates Are Saying

Bachelor in Accounting Jobs & Opportunities

Accounting careers continue to show very strong growth and opportunities in the future. Accounting positions are ranked #3  of best business jobs by U. S. News and World Report. This program enables students to experience the necessary education
required to analyze transactions, prepare journal entries and manage a
company’s payroll or books.

Bookkeepers, accountants and auditing clerks are an organization’s financial record keepers. Their duties are imperative to the survival of a business, no matter how large or small. They may update and maintain one or more accounting records.

They also tabulate expenditures, receipts, accounts payable and receivable and track profit and loss. They represent a wide range of skills and knowledge, from full-charge bookkeepers who can maintain an entire company’s financial records to accounting clerks who handle specific, individual business accounts.

 

Bookkeeper

Bookkeepers are responsible for recording a business’ financial transactions, including payments, invoices, checks and bills.

Accounting Assistant

Accounting assistants use software programs to perform a variety of financial-related tasks, including accounts payable, accounts receivable, billing, collections, and reconciliations.

Payroll Clerk

Payroll clerks are responsible for assisting in managing employee compensation, including verifying hours worked, completing weekly payroll and process employee status and information changes.

Accounting Technician

Accounting technicians are responsible for assisting in the reporting and maintenance of financial accounting data, records and transactions.

Accounts Receivable Clerk

Accounts receivable clerks process and reconcile financial transactions related to incoming receivables, including processing invoices, credit memos, payments, and deposits.

Sales Manager

Sales Managers direct the business development activities of sales personnel, ensuring revenue targets are met or exceeded.

Explore more Jobs & Careers for students
with an Associate Degree in Accounting

Business Administration Concentrations

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.
Accordion Content
Accordion Content
Accordion Content
Accordion Content

Associate of Science in Accounting Frequently Asked Questions

Depends. Take as much time as you wish, but our associate degree program is specifically designed for busy, working adults who want to finish fast. At the University of the Potomac, you can earn your A.S. Accounting in as little as 24 months.

Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.