6 Courses Required

Additional Details

Target Audience

  • Service members transitioning, or veterans who have previously separated or retired, from any military branch

Accreditation

  • Military to Business in Cybersecurity Certificate from Cornell Ann S. Bowers College of Computing and Information Science
  • 116 Professional Development Hours (11.6 CEUs)
  • 40 to 60 Professional Development Units (PDUs) toward PMI recertification

Certificate Description

Security breaches are growing in frequency, sophistication, and consequence. This growth is likely driven by our increasing dependence on computing systems, both as individuals and as nations, which makes these systems attractive targets for malfeasants who design and launch attacks. With a deep understanding of operational security and teamwork, veterans and active service members are uniquely prepared to tackle complex challenges and safeguard critical systems.

This certificate program is designed to introduce you to the field of cybersecurity while also providing elective courses that will strengthen your business acumen and interpersonal skills — critical tools for a successful transition into civilian careers. You will have the opportunity to develop practical literacy in cybersecurity, gaining the leadership and problem-solving skills needed to enact meaningful change at an organizational level.

Beyond technical expertise, this program fosters collaboration by bringing together veterans and professionals from diverse industries, allowing you to expand your network, share perspectives, and build relationships with others who share your career aspirations. You will also gain skills to help you translate the leadership and teamwork skills honed during your service into the business environment, helping you thrive in cross-functional teams and drive mission success.

In addition, you will gain an understanding of the abstractions and principles needed to implement the design and analysis of secure systems. You will become comfortable navigating technical literature, authenticating users, and choosing between discretionary and mandatory access control schemes. By the end of this program, you will be able to identify the appropriate enforcement strategy for a given security policy and take confident steps toward a career in cybersecurity.

The core courses in this certificate program are required to be completed in the order they appear.

Required fields are indicated by .