• Overview
  • Admissions
  • Academics
  • What You’ll Learn
  • Benefits

Overview

The Introduction to Cybersecurity Certificate is an 8-course program designed to introduce learners to the fundamentals of cybersecurity. Through a comprehensive curriculum, participants gain essential skills and knowledge in cybersecurity nomenclature, safety practices, computer basics, ethics, coding, and more. This program lays a strong foundation for further specialization in the cybersecurity field.

Who Should Register

This program is ideal for:

  • Individuals exploring a career in cybersecurity.
  • Beginners interested in learning the basics of cybersecurity and IT systems.
  • Professionals seeking foundational knowledge to enhance their technical skillset.

Why Choose Louisville

Founded in 1798, the University of Louisville (UofL) is a vital ecosystem that creates thriving futures for students, community and beyond. Recognized by the Carnegie Foundation as both a Research 1 and a Community Engaged university, UofL is uniquely positioned to impact lives in areas of student success and research and innovation, while dynamic connections with local and global communities provide unparalleled opportunities. Through its approach to education, innovation and connection UofL is committed to shape a better future for all.

Admission Requirements


Applicants must be 18 years of age or older.

Curriculum Details


Sample courses include:

IT Basics
This module provides students with a basic understanding of the components in an information technology system and their roles in system operation.


Coding
This module provides an introduction to problem-solving techniques and the computer program development process through coding in a high-level language. Topics include: program structure; data types; variables; operations; expressions; input/output; sequence, selection, and repetition; functions; data structures; and software design techniques. Concepts are reinforced with many programming laboratory-exercises throughout the course.


Security Principles & Foundations
This module provides an overview of the cybersecurity field and its related concepts. An introduction to cybersecurity terminology, best practices, principles and standards, planning and management of cybersecurity functions and assets are included. This module will provide a foundation for understanding common threats and attacks and the methods and tools to defend and protect against them, an overview of human, organizational, social, and legal issues related to cybersecurity. and concepts which meet national standards in cybersecurity.


Network Foundations
This course discusses the foundations of computer networks. The course participant will learn about the network architecture including the OSI model and the layering concept. The TCP/IP protocol stack layers will be discussed. Participants will learn about physical layer concepts including communication media, multiplexing, and switching, data link layer concepts and protocols (e.g., MAC protocols for wired LANs such as Ethernet, and ARP), network layer concepts and protocols (e.g., routing and IPv4), transport layer concepts and protocols (e.g., reliable data transfer, TCP, UDP), and application layer concepts such as client-servers. The course also provides an overview of wireless networking technologies (WiFi).


Artificial Intelligence
This module provides an overview of the fundamental techniques and approaches in artificial intelligence. Topics include the history of AI; knowledge and reasoning; problem solving; learning approaches; practical considerations; and responsible AI. The module uses case studies from cybersecurity and healthcare applications.


Cryptography
This module provides an overview of the cryptography field and its related applications. The statistical properties of digital data types such as text, image, and sound are introduced. Basic cryptographic substitution and permutation methods are discussed together with simple software tools. This module presents introduction to symmetric key and public key standards such as Data Encryption Standard (DES), Advanced Encryption Standard (AES), RSA Public-key Cryptosystem, and ElGamal Public-key Cryptosystem. Applications such as data encryption, message authentication, and digital signature are included. Concepts are reinforced with many programming laboratory-exercises throughout the course.


Privacy-Legal Foundations & Ethics
This course examines legal, privacy, and ethical issues of information security in the electronic and internet environment in healthcare.


Database Management
Provides an overview of fundamental concepts of databases and database management. These concepts include aspects of database design, database management systems, data models, normalization, the standard relational database query, SQL, basic database security and relational database alternatives.

 

What You'll Learn


Participants will acquire skills and knowledge in:

  • Basic computer and hardware operations.
  • Computer privacy, security laws, and ethical considerations.
  • Fundamental concepts of artificial intelligence and its applications.
  • Introduction to network and database management.
  • Coding for problem-solving and software design.

Benefits

Graduates of this program will:

  • Understand fundamental cybersecurity concepts and best practices.
  • Be prepared for entry-level roles in IT and cybersecurity.
  • Have a foundation for pursuing advanced cybersecurity certifications and education.

Potential career pathways include:

  • IT Support Specialist
  • Cybersecurity Assistant
  • Network Support Technician
Estimated
Cost: $2,999
Additional tuition reductions and flexible payment options may be available!
Next Start Date: Flexible Start Dates

Program Details:

  • icon Micro-Credential
  • icon Online
  • icon Instructor Led
  • icon 8 courses
  • icon 17 weeks
  • icon 10 hours a week
Upskilling 2 or more people?
Get your team access.
Related Career Pathways