Cybersecurity Certificate
- Overview
- Program Requirements
- Why Choose a Certificate?
Cybersecurity Certificate
The Cybersecurity Certificate furnishes you with both the strategic and technical knowledge to make your company more secure amidst a growing arena of threats to operations, data, and intellectual property. Learn how to best mitigate risk, defend your network from threats originating from both outside and inside your organization, understand forensics and much more. Using an applied approach to learning coupled with a flexible curriculum, the Cybersecurity Certificate allows you to focus on topics that are most important to you.
Program Requirements
Certificate Requirements
- All courses applied to a certificate program must be taken from Georgia Tech.
How it works
Your path to achievement is easy! Most certificate courses are offered in classroom locations around the U.S. You can also inquire about training at your location.
Cost
- Course load determines the cost of a certificate program.
- Calculate your total by identifying the courses needed and tallying individual course fees. Some courses offer discounts for course bundling.
Registration
- Select a certificate program, review the requirements, and determine your timeline for completion.
- Add courses to your shopping cart for purchase as you are ready to take them, or as a group if desired.
- Proceed to checkout to complete your registration. We accept multiple forms of payment including a third-party credit cardholder, purchase order, a private loan, and VA benefits for certain programs.
Completion
- Certificates must be completed within six years.
- After successful completion of most individual courses, a Certificate of Course Completion will be sent.
- After successful completion of all required courses, request a transcript and program certificate audit.
Upon verification, GTPE will email your transcript and mail your Certificate of Program Completion. Some programs host a certificate award ceremony during the final course.
Once you earn your Georgia Tech Program Certificate, tout your success on your resume and LinkedIn profile, share with your employer, and celebrate an important career growth achievement!
Why Choose a Certificate?
Professional Certificates are ideal for developing new skills and building deep expertise in a specialized area to update your professional profile, advance your career, or broaden your knowledge base.
Certificates are an “anytime” credential
Start anytime - after graduation or later in your career - and gain deeper know-how in a specific area without the commitment to a degree.
Certificates demonstrate commitment
The dedication of time to earn a certificate demonstrates that you are committed to achieving a higher standard of professional knowledge in your industry.
Certificates provide immediate “ROE”
Georgia Tech learners master real-world skills and apply them to their career the day after completion.
Certificates stand out on your resume
A Georgia Tech credential carries the professional weight to give you a competitive edge.
Who Should Attend
This certificate is designed for anyone who wants to move into a position that requires increasing oversight into cybersecurity, including engineers, scientists, IT professionals, product designers, and managers.
How You Will Benefit
- Recognize emerging threats and decipher risk in order to develop an appropriate and effective defense best suited to your organization.
- Learn to build smarter and more effective cybersecurity solutions by approaching threats holistically and from the perspective of the intruder.
- Uncover and examine the latest research and techniques in security and mitigation strategies.
- Understand how to apply systems engineering principles to build a stronger enterprise.
-
Grow Your Professional Network
-
Taught by Experts in the Field
Course Offerings
As many business sectors become increasingly information centric and network reliant, cybersecurity is becoming a critical pillar of the enterprise. Cybersecurity: A Systems Approach explores information security vulnerabilities and how to approach cybersecurity resilience as a complex system…
View Course Details »-
Feb 24, 2025 - Feb 28, 2025Register By Feb 24, 2025Online$1,795
Courses may be selected from either Requirement B or a combination of Requirements B and C.
The Department of Defense has migrated toward network-centric warfare concepts, and systems that support these concepts. Commercial technologies and systems developed for the military are being combined to provide connectivity at all levels of command and operational environments. If you're an…
View Course Details »There are no sessions scheduled at this time. Please check again later.
This course provides system security engineers the principles of applied systems engineering with a focus on requirements derivation and documentation. You’ll learn the basics of the systems engineering approach and its relationship to security engineering as applied to weapons and weapons…
View Course Details »There are no sessions scheduled at this time. Please check again later.
Malware is a growing threat to the information and intellectual property of organizations. This introductory course will provide a foundational understanding of malicious software, how malware has shaped the global cybersecurity landscape, and malware's future impact. Discussions and hands-on…
View Course Details »There are no sessions scheduled at this time. Please check again later.
Learn how to apply test and evaluation (T&E) to the cyber domain. The Fundamentals of Cyber Systems Test and Evaluation course approaches T&E from the perspective of Department of Defense (DoD) practitioners, covering the gamut of the roles, responsibilities, processes, procedures, and tools…
View Course Details »There are no sessions scheduled at this time. Please check again later.
Embedded systems offer many opportunities to economically and effectively control large infrastructure systems, small single purpose devices, and many products in between. But their use can also introduce vulnerabilities easily exploited to gain access to valuable data, alter device…
View Course Details »There are no sessions scheduled at this time. Please check again later.
As businesses become more dependent on interconnected systems for survival, they recognize a need to train their own personnel in assessment, exploitation, and remediation techniques. These “red teams” are becoming vital to organizations by exposing vulnerabilities early, implementing…
View Course Details »There are no sessions scheduled at this time. Please check again later.
The National Institute of Standards and Technology (NIST) Risk Management Framework (RMF) provides a mechanism to inform risk decisions and improve cybersecurity. As federal government and private industry transition to RMF, a broad understanding of the entire process eases adoption challenges…
View Course Details »-
Feb 18, 2025 - Feb 20, 2025Register By Feb 13, 2025Atlanta, GA$1,695
Designed as an introduction to digital forensics and incident response, this course explores forensic investigation using freely redistributable, open-source software tools. The course will focus on an analysis of equipment encountered in the enterprise as well as introductory recommendations…
View Course Details »There are no sessions scheduled at this time. Please check again later.
Cyber and non-cyber professionals face challenges in effectively protecting their organizations from ever-evolving cyber threats. You’ll be taught how to identify cyber risks, map their impact across an organization, prioritize concerns, and identify actionable mitigation strategies using…
View Course Details »There are no sessions scheduled at this time. Please check again later.
Take a deep dive into how to use public sources to recognize and respond to malicious cyber activities. This course will help technical cybersecurity specialists track evolutionary and revolutionary aspects of cybersecurity threats in order to more effectively combat emerging threats. In…
View Course Details »There are no sessions scheduled at this time. Please check again later.
Take a systematic approach. In Digital Forensics Techniques for Embedded Systems, you will explore the forensic investigation of the combination of traditional workstations, embedded systems, networks, and system busses. The course reviews the similarities and differences between commodity PCs…
View Course Details »There are no sessions scheduled at this time. Please check again later.
Embedded computing systems are prolific in modern society and increasingly used in applications ranging from consumer products (e.g., mobile devices, wearables, smart appliances) to industrial and military systems (e.g., process control, mobile or field units). Growing dependence on self…
View Course Details »There are no sessions scheduled at this time. Please check again later.
In today’s information-centric environment, protecting organizational data from deliberate or unintentional disclosure is paramount. While most organizations focus on protecting their critical assets and data from external threats, they may overlook the threats originating from inside their…
View Course Details »There are no sessions scheduled at this time. Please check again later.
This course will give students a baseline knowledge of enterprise security operations. Content will explore models and architectures of Security Operation Centers (SOCs), including implementation of both preventative and detective technologies. Students will gain skills in vulnerability…
View Course Details »There are no sessions scheduled at this time. Please check again later.
This lab-based course will introduce you to modern defensive skills required to counteract cyber threats. You will use live equipment and virtual machines representing “blue forces” tasked to negate real-world threats against systems and networks. Instructors will place particular emphasis on…
View Course Details »There are no sessions scheduled at this time. Please check again later.
Artificial intelligence (AI) and machine learning (ML) can be integrated across organizations to improve services, provide better situational awareness, and generate decision-making insights. This course will introduce you to the fundamentals and applications of AI and ML, ranging from…
View Course Details »-
May 13, 2025 - May 15, 2025Register By May 8, 2025Huntsville, AL$1,695
The course may be available as a contract offering. Please fill out this form if you are interested. This course provides students with an increased understanding of how Authentication, Authorization, and Accounting/Auditing (AAA) are deployed in a modern enterprise environment. The course…
View Course Details »There are no sessions scheduled at this time. Please check again later.
This course will help engineers, designers, and others gain foundational knowledge of the broad implications of cyber warfare and electronic warfare (EW) convergence. Topics will introduce traditional cyberattacks and electronic warfare and cover topics such as infrastructure and communication…
View Course Details »There are no sessions scheduled at this time. Please check again later.
Learn best practices and techniques for developing software in a way that prevents the inadvertent introduction of security vulnerabilities in mobile, enterprise, web-based, and embedded software systems. This three-day Secure Software Development course contains a mix of lecture and hand-on…
View Course Details »There are no sessions scheduled at this time. Please check again later.
This course will help engineers, designers, and others gain foundational knowledge of the broad implications of cyber warfare and electronic warfare (EW) convergence. Topics will introduce traditional cyber attacks and electronic warfare and cover topics such as infrastructure and…
View Course Details »-
Jun 10, 2025 - Jun 12, 2025Register By Jun 3, 2025Atlanta, GA$1,795
The Department of Defense has migrated toward network-centric warfare concepts, and systems that support these concepts. Commercial technologies and systems developed for the military are being combined to provide connectivity at all levels of command and operational environments. If you're an…
View Course Details »There are no sessions scheduled at this time. Please check again later.
Frequently exploited software vulnerabilities are often caused by avoidable software defects. In this course, you will examine multiple examples of insecure code and learn steps that can be taken to prevent future problems. The course concentrates specifically on how these issues arise in the…
View Course Details »-
Jun 24, 2025 - Jun 26, 2025Register By May 23, 2025Las Vegas, NV$1,895
The Cybersecurity for Critical Infrastructure course provides a fundamental understanding of cybersecurity principles applied to industrial sectors considered to be critical infrastructure. This course provides a brief review of cybersecurity principles and control system technologies,…
View Course Details »There are no sessions scheduled at this time. Please check again later.
Up to one of the following courses may be applied towards Requirement B.
Data analysis in Electromagnetic Warfare (EW) depends on a set of skills and tools with an understanding of EW-specific challenges. Assuming no prior knowledge, this course begins with basic analytical methods and strategies for reading and plotting data, and proceeds to more advanced…
View Course Details »-
Apr 16, 2025 - Apr 17, 2025Register By Apr 10, 2025Atlanta, GA$1,595
DevSecOps is a critical component in modern software engineering. Through DevSecOps principles and practices, an organization can deliver software-enabled capabilities rapidly while ensuring quality and security. The DevSecOps and Military Applications course provides a detailed understanding…
View Course Details »There are no sessions scheduled at this time. Please check again later.
Dive into the dynamic world of Machine Learning Operations (MLOps) by understanding the core pillars: Infrastructure, Automation, and Pipelining. From contrasting cloud and on-premise solutions to understanding the power of Active Learning in modern MLOps, we've got you covered. Delve into…
View Course Details »There are no sessions scheduled at this time. Please check again later.
Gain a working knowledge of MIL-STD-1553, the communications standard used by Air Force, Navy, Army, NASA, and others for high-reliability communication applications. In this course, discover all you need to know to effectively use this communications standard in your applications. Understand…
View Course Details »-
Mar 4, 2025 - Mar 5, 2025Register By Feb 28, 2025Atlanta, GA$1,295
INACTIVE COURSES
The following courses are no longer offered but may still be applied if completed within the six-year rule:
- Exploitation and Defense of IT Systems: Hands-on Lab (DEF 4602P)
- Mobile Device Security (DEF 4605P)
- Cyber Vulnerabilities, Embedded Systems (DEF 4614P)
- Cyber Electronic Warfare Convergence (DEF 4615P)
- Data Analytics and Methodologies (DEF 4616P)
Cybersecurity Fundamentals: Multilevel Security (DEF 4620P)
- Artificial Intelligence: Ethics, Trust and Bias (DEF 4636P)
- Introduction to AI: The Basics (DEF 4637P)
- DEF 4614P and DEF 4615P must have been taken together and count as one course.