Richmond Home

Information Systems & Security

Network, information and systems security is an ever-evolving topic. Our certificate programs in information systems and security, taught by select faculty from our degree programs in information systems, provide just-in-time specialized knowledge in manageable four- and five-week sessions to help you stay abreast of the latest trends and practices in a constantly changing industry.

Our first programs are now available: IT Security Essentials and the Ethical Hacker Series. Additional programs in compliance and auditing and cloud-based systems are among those planned for the future. 

Our noncredit certificate programs will be of interest to:

  • those just starting their career
  • career changers seeking to achieve advancement 
  • managers and end users requiring a more in-depth understanding of certain information systems topics
  • seasoned practitioners seeking to round out their knowledge and attain a credential to demonstrate in-depth understanding of information systems topics 

Students also have the option to complete individual classes offered as part of any certificate program.

IT Security Essentials Certificate
About the Certificate

This certificate program is designed to develop the core knowledge and functional competencies required to work in the cutting-edge and rapidly evolving fields of information security.

This certificate will be of interest to individuals just starting their career; career changers seeking to achieve advancement; managers and end users requiring a more in-depth understanding of information security and data protection; and seasoned practitioners seeking to round out their knowledge and attain a credential to demonstrate in-depth functional understanding.

Students who complete the program will earn a noncredit certificate as well as CEUs. You may register a la carte in individual classes ($495 per 10-hour class) or in the certificate course, which includes all three classes ($1,295, representing a $190 savings over a la carte enrollment).

The certificate is designed for:

  • IT professionals, IT managers, systems and network administrators
  • Information security professionals
  • Business professionals interested in IT security
  • Legal and regulatory professionals
  • Risk analysts and managers, privacy analysts and specialists
  • Career switchers seeking professional training
Key Learning Outcomes

At the completion of the program, students will:

  • Gain an understanding of the role information security plays in organizations
  • Analyze organization’s data security needs
  • Provide effective data security solutions
  • Secure a network and servers
  • Handle information and data security incidents
  • Manage the defense and protection of vital company information from attack using the latest technologies and strategies.
  • Investigate the types of external and internal threats that can compromise customer data, employee personal information and digitized intellectual property.
  • Examine effective policies for mitigating risks
  • Learn how to implement security and remediation measures across an entire organization.
Earning the Certificate

No application is required. Simply register for one of the required courses and confirm your interest in earning the certificate as part of the course registration process. Or register for the certificate program, which enrolls you in all three required courses, to save on the total enrollment fee.

To meet the requirements for the certificate, you must:

  • Complete the required certificate courses.
  • Pass the learning outcomes assessment (LOA) in each course.
  • If you register for the certificate program, complete the required courses within 3 months.
  • If you register for individual courses, complete the required courses within 18 months.

The program has been designed for students to complete all three required courses in three months. Student may take up to 18 months to complete the certificate requirements.

Courses

This certificate requires three courses, recommended to be taken in the following sequence:

  1. Introduction to Information Security
  2. Introduction to Networking and Security
  3. Securing Your Enterprise

If you register for the IT Security Essentials Certificate Program, you’ll complete all three courses in the order above. 

Ethical Hacker Certificate
About the Certificate

This program introduces and teaches ethical hacking or penetration (pen) testing. Pen testers are contracted to test customer systems by hacking into them and to present test results to the customer.

This certificate program will be of interest to IT professionals seeking a background in pen testing, to those seeking to improve their network and security skills toward entry-level employment, to managers seeking to better understand how illegal hackers may target system vulnerability, and to end users seeking to learn the legal and ethical constraints of ethical hacking.

Students who complete the program will earn a professional certificate as well as CEUs. Your registration in the certificate includes the three required modules.

The certificate is designed for:

  • IT professionals, IT managers, systems and network administrators
  • Information security professionals
  • Business professionals interested in IT security
  • Legal and regulatory professionals
  • Risk analysts and managers, privacy analysts and specialists
  • Career switchers seeking professional training, especially quasi-legal hackers
Key Learning Outcomes

At the completion of the program, students will:

  • Develop a vocabulary and understand the basics of ethical hacking
  • Recognize the context, definitions, processes and procedures of ethical hacking
  • Understand and learn the tools and methodologies that hackers use
  • Learn to use Metasploit, arguably the most popular penetration testing framework
Earning the Certificate

No application is required. Simply register for one of the required courses and confirm your interest in earning the certificate as part of the course registration process. Or register for the certificate program, which enrolls you in all three required courses, to save on the total enrollment fee.

To meet the requirements for the certificate, you must:

  • Complete the required certificate modules.
  • Pass the learning outcomes assessment (LOA) in each course.
  • If you register for the certificate program, complete the required courses within 3 months.
  • If you register for individual courses, complete the required courses within 18 months.

The program has been designed for students to complete all three required courses in three months. Student may take up to 18 months to complete the certificate requirements.

Courses

This certificate consistst of three required modules taken in the following sequence:

  1. Introduction to Ethical Hacking
  2. Introduction to Ethical Hacking Tools
  3. Introduction to the Metasploit Framework
Geographical Information Systems Certificate
About the Certificate

This program introduces and teaches practical GIS applications in an age of space and place data everywhere.

GIS are Geographical Information Systems, a specialized class of information systems, which possess all the normal functionality and common components of any type of information system, but which also provide additional targeted functionality and processing capabilities to integrate space, place, and time-based objects and attributes into the analysis of people’s and organizations’ business problems.

From multi-thousand dollar proprietary software applications like ESRI's Arc GIS, to free apps from your favorite app store, GIS and GIS-like technologies and software do far more than people imagine.

This 12-week, noncredit course will spark your imagination and give you a marketable skill. This course is a hands-on journey into the practical uses of geographical information systems (GIS) software, applications, and data. The class will be project-based, focusing upon a series of projects that increase familiarity with using software tools and address current business or organizational problems that benefit from analysis employing geographical or geospatial perspectives.

Key Learning Outcomes

At the completion of the program, students will:

  • Have a grounded understanding how GIS software works
  • Recognize the broad range of problems that are addressed and can be solved using GIS and available data
Earning the Certificate

No application is required. Simply register for the single required course and confirm your interest in earning the certificate as part of the course registration process.

To meet the requirements for the certificate, you must:

  • Complete the required certificate courses.
  • Pass the learning outcomes assessment (LOA) in each course.
Uses for GIS

Projects like predicting retail earnings and estimating market share by counting parked cars and traffic patterns around big box retailers, or mapping soil types for agricultural planning, or fighting wildfires by planning firefighter dispatch, optimizing solar panel energy output with global horizontal irradiance.

Other GIS-like applications are found on mobile devices like tablets and smart phones. User-friendly apps like Waze and Google Maps and scores of apps designed for personal convenience and personal decision making. GIS encompasses creating and using visual and spatial aids to improve personal and organizational decision making. 

Think of GIS as more of a tool than a field in itself: Jobs may be available combining GIS with other fields as follows:

  • GIS + programming
  • GIS + forestry
  • GIS + web development
  • GIS + statistics
  • GIS + geology
Available Classes
IT Security Essentials
No courses matched your search.
Ethical Hacker
White Hat - Ethical Hacker Series Certificate
Course Offerings (1)
June 12, 2017 through August 28, 2017
Mondays: 6:30 - 9:00 pm
Instructor: ISS Staff
CRN: TEC317.01
Fee: $1,349
Description
This course combines all three of the White Hat Ethical Hacker Series courses: Introduction to Ethical Hacking, Introduction to Ethical Hacking tools, and Introduction to the Metasploit Framework. This series offers working knowledge of the requisite background information and relevant hacking topics such as the history of hacking, computer system fundamentals, gaining access to systems, network scanning, and how to find vulnerabilities.

Geographical Information Systems (GIS)
No courses matched your search.

Contact Us

Special Programs Building
28 Westhampton Way
Univ. of Richmond, VA 23173
Phone: (804) 289-8133
Fax: (804) 289-8138
spcs@richmond.edu

Monday-Friday: 8:30am–5pm
Closed for University holidays