Undergraduate Certificate Program in Cyber Security

Undergraduate Certificate Program in Cyber Security

Undergraduate Certificate
in Applied Cybersecurity (ACS)

Prepare to launch a cybersecurity career.

Gain the knowledge, tools, and techniques you need to launch a cyber security career — in an undergraduate certificate program designed and taught by some of the industry's top experts. You'll investigate issues that affect complex and interconnected IT systems, learn to combat common threats to valuable data, and emerge with hands-on skills employers are seeking.

Curriculum | 12 credits

Click on each course title for a full description.

Core Courses | 9 credits
ACS 2201 Technology Essentials   |   CyberStart Essentials

Content: CyberStart Essentials
Assessment: Exam
3 Credit Hours

ACS 2201 Technology Essentials provides you with the fundamental technical knowledge and skills that serve as the baseline for all professionals in cybersecurity, reinforcing key concepts with more than 45 in-browser interactive labs and 17 extended practical skill applications in virtual-machine based labs. You'll establish a core understanding of technology component functions and apply that knowledge to security concepts such as reconstructing a crime from digital evidence or locating exploitable flaws in software and websites.

Technology Essentials ensures a solid mastery of computer, hardware, network, and cybersecurity fundamentals, including the study of operating systems, Windows security tools, Linux, programming with Python and C, advanced Google searches, reconnaissance, virtualization, and encryption. You'll explore the inner workings of packets and protocols that allow the internet to function and learn the role of a computer's central processing unit (CPU), how it executes code, its relationship with memory, and the fundamentals of how attackers disrupt intended behavior.

ACS 2202 Security Essentials   |   SEC 401, GSEC

Content: SANS SEC 401 Security Essentials Boot-camp Style
Assessment: GIAC GSEC Exam
3 Credit Hours

ACS 2202 is a technically-oriented survey course in which you'll learn the most effective steps to prevent cyber attacks and detect adversaries. In classes and hands-on labs, you'll learn to develop effective security metrics that provide a focused playbook that IT can implement, auditors can validate, and executives can understand. You'll explore methods to analyze and assess the risk to your environment in order to drive the creation of a security roadmap that focuses on the right areas of security. And you'll learn practical tips and tricks to focus in on high-priority security problems and on the actions required to protect and secure an organization's critical information assets and business systems.

ACS 2203 Security Incident Handling & Hacker Exploits   |   SEC 504, GCIH

Content: SANS SEC 504 Hacker Techniques, Exploits & Incident Handling
Assessment: GIAC GCIH Exam
3 Credit Hours

By adopting the viewpoint of a hacker, ACS 2203 provides an in-depth investigation of the critical activity of incident handling. You'll be taught how to manage intrusions by first looking at the techniques used by attackers to exploit a system. You'll learn responses to those techniques, which can be adopted within the framework of the incident handling process to handle attacks in an organized way. The faculty instruction, lab exercises, and exam are coordinated to develop and test your ability to use the core capabilities required for incident handling.

Elective Courses | 3 credits (choose one)
ACS 3215 Advanced Security Essentials   |   SEC 501, GCED

Content: SEC 501 Advanced Security Essentials - Enterprise Defender
Assessment: GIAC GCED Exam
3 Credit Hours

ACS 3215 reinforces the theme that prevention is ideal, but detection is a must. You will learn how to ensure that the organizations you work for constantly improve their security posture to prevent as many attacks as possible. A key focus is on data protection, securing critical information whether it resides on a server, in robust network architectures, or on a portable device.

Despite an organization's best effort at preventing attacks and protecting its critical data, some attacks will still be successful. Therefore, you will also learn how to detect attacks in a timely fashion through an in-depth understanding of the traffic that flows on networks, scanning for indications of an attack. The course also includes instruction on performing penetration testing, vulnerability analysis, and forensics.

ACS 3220 Intrusion Detection In-Depth   |   SEC 503, GCIA

Content: SEC503: Intrusion Detection In-Depth
Assessment: GIAC GCIA Exam
3 Credit Hours

ACS 3220 delivers the technical knowledge, insight, and hands-on training you need to defend your network with confidence. You will learn about the underlying theory of TCP/IP and the most used application protocols, such as DNS and HTTP, so that you can intelligently examine network traffic for signs of an intrusion. You will get plenty of practice learning to master different open source tools like tcpdump, Wireshark, Snort, Bro, tshark, and SiLK. Daily hands-on exercises suitable for all experience levels reinforce the course book material so that you can put your knowledge into action.

ACS 3315 Web App Penetration Testing & Ethical Hacking   |   SEC 542, GWAPT

Content: SEC 542 Web App Penetration Testing and Ethical Hacking
Assessment: GIAC GWAPT Exam
3 Credit Hours

ACS 3315 is a highly technical information security course in offensive strategies where you'll learn the art of exploiting Web applications so you can find flaws in enterprise Web apps before they are otherwise discovered and exploited. Through detailed, hands-on exercises you'll learn the four-step process for Web application penetration testing. You will inject the programming language SQL into back-end databases, learning how attackers steal sensitive data. You will then use cross-site scripting attacks to dominate a target infrastructure in a unique hands-on laboratory environment. Finally, you'll learn in-depth about various other Web app vulnerabilities and explore tried-and-true techniques for finding them using a structured testing regimen.

ACS 3320 Network Penetration Testing & Ethical Hacking | SEC 560, GPEN

Content: SEC560: Network Penetration Testing and Ethical Hacking
Assessment: GIAC GPEN Exam
3 Credit Hours

Every organization needs skilled information security personnel who can probe for vulnerabilities that attackers might exploit in networks, web-based applications, and computer systems, and mitigate them. ACS 3320 is specially designed to get you ready for that role. The course starts with proper planning, scoping and recon, then dives deep into scanning, target exploitation, password attacks, and web app manipulation, with over 30 detailed hands-on labs. After building your skills, you'll conduct an end-to-end pen test, applying knowledge, tools, and principles from throughout the course as you discover and exploit vulnerabilities in a realistic sample target organization.

ACS 3425 Advanced Digital Forensics & Incident Response   |   FOR 508, GCFA

Content: FOR 508 Advanced Digital Forensics, Incident Response, and Threat Hunting
Assessment: GIAC GCFA Exam
3 Credit Hours

ACS 3425 teaches the skills needed by forensic analysts and incident responders to identify and counter a wide range of threats within an organization's networks, including economic espionage, hacktivism, and financial crime syndicates. The course shows you how to work as a digital forensic analyst and incident response team member to identify, contain, and remediate sophisticated threats, including nation-state sponsored Advanced Persistent Threats and financial crime syndicates. In a hands-on lab, you'll work on a project based on a real-world targeted attack on an enterprise network in order to learn how to identify what data might be stolen and by whom, how to contain a threat, and how to manage and counter an attack.

ACS 3515 Security Essentials for Industrial Control Systems   |   ICS 410, GICSP

Content: ICS 410 ICS/SCADA Security Essentials
Assessment: GIAC GICSP Exam
3 Credit Hours

ACS 3515 is an introductory study of how information technologies and operational technologies have converged in the systems and networks used in industrial processes. This convergence has led to a greater need than ever for a common understanding between the various groups who support or rely on these systems. In this course, students from different professional backgrounds develop and reinforce a common language and understanding of Industrial Control System (ICS) cybersecurity as well as the important considerations that come with cyber-to-physical operations within these environments. In classes and hands-on labs, you will gain a foundational set of standardized skills and knowledge needed by industrial cybersecurity professionals across a wide range of industry sectors and applications.

New to the field? No problem.

This undergraduate cybersecurity certificate program is designed for people who want to join the cyber workforce — whether you're about to finish your associate degree, you're in a 4-year college program or a theory-based master's degree program, or you're a mid-career professional who wants to transition into cybersecurity.

You don't need prior cybersecurity experience, but you must have completed at least two years of college.

“I was having a hard time getting a job in information security due to my lack of hands-on experience. SANS gave me extraordinary training and the opportunity to rise to the top of the resume pile.”
AJ Langlois,Cyber Analyst II, BB&T

Customize Your Program

Start when you want to.
We accept applications monthly, so you can start on the schedule that works for you. Learn more.

Complete the certificate at your pace.
Earn your undergraduate cybersecurity certificate in 18 months while working full-time or pursuing a degree. Or choose an accelerated option to finish in less than a year.

Study online or in-person.
Take courses that are entirely online or that start with weeklong in-person events held around the country. Or do a mix of both.

Plan Your Course of Study

As a student at one of the top cybersecurity schools, you'll work closely with a student advisor who will help you plan your course of study each step of the way.

Download the 2019 Course Catalog for more information including:

  • Academic calendar
  • Tuition and fees
  • Live event schedule
  • Costs associated with attending live events
  • Graduation requirements

The SANS Technology Institute Advantage


  • Take courses online or at immersive weeklong events throughout the country. Pursue the cybersecurity certificate alongside a degree program or while working full-time.

Rapid Career Preparation

  • Gain fundamental technical knowledge and skills that serve as the baseline for all professionals in cyber security.

Proof of Job Readiness

Specific Skill Building

  • Choose an elective to begin developing a specialized skillset in topics ranging from incident response and penetration testing to industrial control systems and cyber defense operations.

Pathway to a Master's Degree

  • 75% of the credits earned in the undergraduate cybersecurity certificate program may be applied directly toward the master's degree program if you hold a bachelor's degree and are admitted to the master's program.

About the SANS Technology Institute

Founded in 2005, the SANS Technology Institute (STI) is the independent, regionally-accredited, VA-approved subsidiary of SANS, the world's largest and most trusted provider of cybersecurity training, certification, and research. Offering graduate and undergraduate programs at the cutting edge of cybersecurity, STI is strengthening the cyber workforce through a career-focused curriculum built on proven SANS courses and industry-recognized GIAC certifications.

The SANS Technology Institute is accredited by The Middle States Commission on Higher Education (3624 Market Street, Philadelphia, PA 19104 - 267.284.5000), an institutional accrediting agency recognized by the U.S. Secretary of Education and the Council for Higher Education Accreditation.