Skip to main content

Fall Course Registration open now. Register today to get the courses you need!

Information Assurance and Information Technology Security GCERT

About The Program

Program accreditation

The Committee on National Security Systems (CNSS) and The National Security Agency (NSA) certify that Metropolitan State University offers a set of courseware that has been reviewed by National Level IA Subject Matter Experts and determined to meet National Training Standards for Information Systems Security (INFOSEC) Professionals, CNSS National Standards 4011, 4013, and 4016.

These include:

  • NSTISSI-4011, National Training Standard for Information Systems Security (INFOSEC) Professionals
  • CNSSI-4016, National Information Assurance Training
  • CNSSI-4016, National Information Assurance Training Standard for Risk Analysts (RA)

The Information Assurance (IA) and Technology (IT) Security Graduate Certificate program is designed to meet the fast-moving needs of security professionals from a managerial perspective, addressing national standards for this area. Several high profile data breaches highlight how information technologies that enable us to share information across town, across the country, or around the world faster are vulnerable. The need for organizations to manage the security needed to make these technologies safe and useful is crucial.

The National Security Agency's (NSA) Information Assurance Directorate is dedicated to providing information assurance solutions that keep our information systems safe from harm, thus protecting national security. Metropolitan State University is committed to enhancing its initiative in information assurance by offering this Graduate Certificate Program through the College of Management. Metropolitan State University has been designated as a Center of Excellence in Information Assurance and Cyber Security by the National Security agency (NSA).

This program:

  • examines the role management plays in creating an infrastructure that enables data security
  • examines the issues for organizations in developing policies and procedures to protect information, detect unauthorized access and respond to threats
  • provides students and organizations with education, information, and training which focuses on how to identify and respond to cyber threats or cyber criminals
  • helps students and organizations develop and deploy policies and other safeguards of information assets.

Student outcomes

Gainful Employment Disclosure

Gainful employment programs are those "that prepare students for gainful employment in a recognized occupation." Public institutions are required to report this information for all undergraduate and graduate programs that are Title IV eligible and that lead to certificates, diplomas, graduate certificates or specialist awards. Degree programs at all levels are not considered to be gainful employment programs.

Potential Career Opportunities

  • Cyber Security Analysis
  • Forensic Computer Analysis
  • Information Security Analysis
  • Penetration Testing
  • IT Security Consulting
  • Security Engineering
  • Malware Analysis
  • IT Security Management
  • IT Security Architect
  • Security Director
  • Chief Information Security Officer

How to enroll

Program eligibility requirements

Please see How to Enroll for Program eligibility requirements.

Application instructions

Questions?

For questions about applying to the Information Assurance and Information Technology Security GCERT program, email graduate.studies@metrostate.edu (preferred) or call 651-793-1302.

Deadlines

July 1 - Fall semester
Nov. 15 - Spring semester
March 15 - Summer semester

*U.S. Citizens, Permanent Residents

Applications are complete once all requirements are met and fee received. Completed application files will be forwarded to the College of Management Graduate Admission Committee for review, please allow 7-10 business days.

Late applications: applications will continue to be accepted beyond the deadline, however we cannot guarantee admission, though we can defer admission to the next available semester.

Incomplete applications will be moved to the next available semester for up to three terms total, giving applicants who need it, up to one year to complete their application file.

International Students

Because this is not a degree-granting program, applications from international students studying on an F-1 student visa will not be accepted.

Application packet

A complete application file consists of two parts. Begin by completing the online graduate application. All application materials become the property of Metropolitan State University and are not returned.

Part one

  • Complete the Online Graduate Application—You will use your Minnesota State StarID to complete the application. If you don't have a Minnesota State StarID you will create one at the beginning of the application.
    • If you do not have or choose not to provide your Social Security number (SSN) please follow the No SSN instructions to activate your StarID.
    • If you encounter difficulty with the online application please email graduate.studies@metrostate.edu
  • $20 non-refundable application fee; pay online
    • Waived for graduates of Metropolitan State, and for certified veterans & active military.
  • Official transcripts
  • Transcript showing a baccalaureate degree or equivalent earned from a regionally accredited institution with grade-point average or narrative description describing courses completed.
    • Transcripts from any graduate or professional programs are required.
    • All transcripts from non-U.S. schools must be evaluated (course-by-course) by either ECE (preferred) or WES.
    • Electronic transcripts should be sent to admissions@metrostate.edu
    • Paper transcripts should be sent directly from the sending institution (preferred) to:

      Metropolitan State University
      Attn: Graduate Admissions
      700 East Seventh Street
      Saint Paul MN 55106

Part two

After you have submitted your online application, log in to the Applicant Portal using your Start ID and password to upload application materials, and check on the status of your application.  The Applicant Portal will indicate missing application items.

  • Current Resume; upload via the Applicant Portal using your StarID.
    • One year of professional work experience is required for the program.
  • Completion of an undergraduate statistics class with a grade of B or better or completion of MBA Math.
    • If you choose to take MBA Math, you must achieve a minimum proficiency score on each of the lessons (see MBA math Frequently Asked Questions page).
    • MBA math is self-paced; you can retake any lesson until you reach minimum proficiency at no additional cost.
    • The STATS prerequisite will be waived if you take MBA Math and reach minimum proficiency in each of the STATS lessons.
    • Email your name and StarID to graduate.studies@metrostate.edu and request the promo code.
    • Register for MBA Math
  • After you register, while logged in to MBA Math:
    • Go to My Account | My Schools.
    • If you see a Metropolitan State entry, make sure the Allow School Access box is checked.
    • If you don't see Metropolitan State in the My Schools section, click Add School w/ School-Provided RSVP Code, enter the promo code given to you when you registered, click Add Code and make sure the new entry's Allow School Access box is checked.
  • Admission Essay: upload via the Applicant Portal using your StarID. Your admission essay will serve as both a goals statement and a writing assessment. The admission essay is extremely important to the application review process. Submit your essay in 600-700 words (about three pages) in 12-point font, double-spaced, clearly written, well-organized, with correct grammar, accurate spelling and punctuation, good sentence structure, and clear sub-headings. Make sure that you carefully address each of the following:
    • Pledge of Authorship: Please begin your admissions essay with the following statement: (Your essay will not be accepted if this is not included.) I, (complete name)____________________________________, verify that this admissions essay is my own work, and I am fully aware that discovery otherwise will invalidate my entire application.
    • Describe the kinds of responsibilities and positions you have held in your past work and professional experience (volunteer or employed), both IT-related and others.
    • Explain why you are pursuing an Information Assurance (Security) graduate certificate. Please note areas of particular interest and why you are interested.
    • Describe how a graduate certificate in Information Assurance (Security) will enhance your career and life plans for the future.

Courses and Requirements

SKIP TO COURSE REQUIREMENTS

If the Director of the MIS Graduate Program determines that you have full prior competence in a certificate course, you may be given credit for the competency and allowed to take sufficient alternate credits to meet the total credit requirement of the certificate. (E.g., if you have completed a graduate 4 credit Management Information Systems course that is accepted, you would be allowed to consider that function completed within the Certificate, and can then take an alternate 4 credits, with approval of the Coordinator.)

Requirements (20 credits)

Management Information Systems (MIS) evolved from essentially an organization's support operation to a strategic element of an organization's life and survival. This course explores information systems' new and expanding roles in the enterprise. Models examined showing how new technologies are assimilated into the organization, how to plan for systems within the overall strategic management process, assess the risk in system development projects, and become a "sophisticated user" of information systems. Traditional and new technologies are utilized. The course also includes a solid review of the strategic and tactical impact of computers, networks and new technologies. . This course broadens understanding of the design and implementation of various computerized information systems to support management decision making and evaluation, and prepares the student to integrate new technologies and configurations into the management process.

Full course description for Management Information Systems

This course was created to give students a thorough look at the discipline of process analysis and design, workflow analysis and process reengineering. It uses a highly visual approach to both designing and communicating process analysis. Students will learn to properly analyze, design and build the main visualizations for process analysis including flowcharts, data flow diagrams, entity relationship diagrams and others as tools for communicating management designs.

Full course description for Process Analysis and Design

Any IT development project contains significant risks. However, keeping the status quo is also risky in rapidly changing technological and competitive environments. This course is designed to familiarize the student with risk analysis concepts derived from many sources including financial, actuarial and statistical studies, insurance and risk analysis, software quality assurance methodologies, management and audit trails and many others. Student will learn to assess the risk in an information systems portfolio and develop strategies for managing the many risk types discussed: Prerequisites: MIS 600.

Full course description for Risk Analysis in Information Technology

Modern organizations operate in a net-centric world. New information technologies arrive at lightning speed, allowing us to share information across town, across the country, and around the world faster than ever before. Organizations in both the public and private sectors organizations suffer from not realizing the value of the information assets they manage. This class will present and provide an introduction to information assurance (IA) and explore a wide range of business services and how they are impacted by IA issues. Topics covered include: How to assess risks and develop a security policy for operational integrity. Learning outcomes for this course include: Defining the roles and responsibilities of technical and non-technical participants in Enterprise systems development and utilization; The applications of information technology in business organizations and managerial decision making; Knowing associated ethical and societal implications; Understanding how emerging…

Full course description for Introduction to Information Assurance

Organizations with computer networks, Web sites, and employees carrying laptops and mobile devices face an array of security challenges. Among other things, they need to keep unauthorized people out of the network, thwart Web site hackers, and keep data safe from prying eyes or criminal hands. This course provides a high-level overview of these challenges. This course is not for the hard-core IT security engineer who works full time on networks. Instead, it is aimed at the nontechnical executive with responsibility for ensuring that information and assets stay safe and private. The course presents a guide to Thwarting Data Thieves and Hackers and covers the following technical issues in a nontechnical manner: -The concept of "defense in depth" -Network design -Business-continuity planning -Authentication and authorization -Providing security for your mobile work force -Hackers and the challenges they can present -Viruses, Trojans, and worms But it doesn't stop there. The course goes…

Full course description for Enterprise Security Management

This course is designed to provide students and practitioners a framework to build and implement an IT security strategy that is aligned with their business needs. A key element of Security is developing and implementing these strategies. In the course, you will learn about: 1. Advanced concepts and principles of strategic planning for IT Security. 2. Applications of risk principles, security policies to improve operational integrity are learning outcomes for this course. 3. Roles and responsibilities of technical and non-technical participants in Enterprise systems development and utilization. 4. Applications of information technology in business organizations and managerial decision making, and associated ethical and societal implications. 5. Emerging technologies and the risks they pose to organizations.

Full course description for Analysis of Strategic and Tactical Security IT Planning

Program planner