Graduate Certificate Cybersecurity Management
PROGRAM AT A GLANCE
Why earn your Graduate Certificate in Cybersecurity Management from Strayer?
This graduate certificate program is designed to foster technology leadership and strategic influence in deploying information technology solutions that can enhance organizational performance and strengthen cybersecurity defenses.
Secure your organization with essential cyber skills
Discover how to protect assets and data from hackers with a Graduate Certificate in Cybersecurity Management. Real-world cybersecurity case studies will help you learn to identify threats and mitigate their impact using both advanced technology and management strategies. Strayer’s program provides a strong foundation in policies and risk management for those seeking to broaden their knowledge, pursue their career goals or explore new prospects in the realm of cybersecurity.
Skills you’ll learn with a Strayer Graduate Certificate Cybersecurity Management
A Strayer certificate can help prepare you for career opportunities in cybersecurity management while offering support, flexible learning options and career planning every step of the way.
- Develop knowledge about policies, guidance, technologies and organizational concerns that security managers must address in leading and providing secure computing environments.
- Explore topics such as access control, risk identification and cryptography.
- Assess and manage risk based on defining an acceptable level of risk for information systems, elements of a business impact analysis, business continuity plan and disaster recovery planning.
- Examine the threats, crimes and other abuses that are present in the cyber realm. Topics include identifying the bad actors in cyberspace, examining how they used the internet for criminal activity, and evaluating techniques in preventing crime and abuse.
Earn your certificate from an accredited university
Strayer University is an accredited institution and a member of the Middle States Commission on Higher Education (MSCHE or the Commission) www.msche.org. Strayer University’s accreditation status is Accreditation Reaffirmed. The Commission’s most recent action on the institution’s accreditation status on June 22, 2017 was to reaffirm accreditation. MSCHE is recognized by the U.S. Secretary of Education to conduct accreditation and pre-accreditation (candidate status) activities for institutions of higher education including distance, correspondence education, and direct assessment programs offered at those institutions. The Commission’s geographic area of accrediting activities is throughout the United States.

Graduate Certificate in Cybersecurity Management cost breakdown
- 3 courses, $2490 per course
- $65 technology fee each term
- $25 one-time degree conferral fee
- Additional costs for textbooks and supplies
Estimate the cost of your degree
How much can I save on a Graduate Certificate in Cybersecurity Management?
Estimate the cost of your degree
How much can I save on a Graduate Certificate in Cybersecurity Management?
Expected Graduation
...
Approximate Total
...
*Student is required to take two courses per quarter during disbursement period
PREPARING YOUR RESULTS
Time commitment
Calculate the approximate time commitment of your degree.
Course load | ... courses/term |
Classroom time | ... hours/week |
Terms per year | ... terms |
Terms to graduation | ... terms |
Cost analysis
Calculate the approximate cost of your degree
Tuition | ... |
Books | ... |
Fees | ... |
No-cost gen ed | $0 |
Transfer credits | ... |
Transfer Credit Scholarship | $0 |
$4K scholarship | $0 |
Strayer Learn and Earn Scholarship | $0 |
Approximate total | ... |
What coursework do you need to specialize in cybersecurity?
This three-course program is designed to foster technology leadership and strategic influence in deploying information technology solutions that can enhance organizational performance and strengthen cybersecurity defenses. View all courses.
Certificate courses
This course presents current and emerging theories in security management. Topics include the policies, guidance, technologies and organizational concerns that security managers must address in leading and providing secure computing environments. Students will explore topics such as access control, risk identification and cryptography.
This course addresses the topic of risk management and how risk, threats and vulnerabilities impact information systems. Topics include how to assess and manage risk based on defining an acceptable level of risk for information systems, elements of a business impact analysis, business continuity plan, and disaster recovery planning. PREREQUISITE: CIS 502
This course examines the threats, crimes and other abuses that are present in the cyber realm. Topics include identifying the bad actors in cyberspace, examining how they used the internet for criminal activity, and evaluating techniques in preventing crime and abuse. Students will explore different types of cyberattacks and their characteristics. PREREQUISITE: CIS 502
How to apply for a certificate at Strayer?
The admissions process takes a few simple steps. Here’s what you’ll need to get started:
A completed application and enrollment agreement
A high school diploma or equivalent, an unofficial transcript or an official transcript
A valid, current and legible government-issued photo ID
Fall classes start on October 6
Learn more about Strayer University’s admissions process.
Transferring to Strayer from another university?
Some or all of the credits you’ve earned may be transferable.
Strayer welcomes international students
Strayer University is proud to have hosted more than 3,000 international students from over 110 countries. Earn your degree in the U.S. or completely online in your home country – it’s your choice.

Campus locations
Come to a campus near you for guidance and support. You’ll have access to helpful resources, a supportive community and plenty of spaces to learn and grow.
Ready to take the next step?
Your admissions officer is here to guide you through every step of the process, from completing your application to choosing your concentration.