8-Week Course
8 Continuing Education Units
31.25 PDUs
80 Military Clock Hours

About the Course

Policies and technologies need dedicated people who can implement and manage them. Become part of a well-trained workforce that effectively combats hackers, fights attacks and battles other threats.

This in-depth course builds on Essentials of Cybersecurity to expand your knowledge in the cybersecurity field. Topics include communication security, infrastructure security, cloud computing, cryptography, access control, authentication, external attacks, operational and organization security.

Prerequisites for this course:

Earn a Digital Badge
Villanova students will earn a digital badge when they successfully complete an individual course or full certificate program. These badges help to emphasize their skills and commitment to professional development and enables them to easily share and display the badge on a resume and/or social media.
8 Week Course
Week 1
Introduction to Mastering Cybersecurity/Security+™ - Part 1
  • List and explain three types of access control and six authentication mechanisms
  • Identify assets, vulnerabilities, and threats and assess risk mitigation strategies
  • Determine specific risks associated with cloud computing and virtualization
  • Name and describe security policies that facilitate compliance
  • Summarize five basic network classifications and their standard building blocks
  • Diagram the OSI model layers and the TCP/IP stack components
Week 2
Introduction to Mastering Cybersecurity/Security+™ - Part 2
  • Evaluate various types of firewalls and other network security tools
  • Explain how RADIUS, TACACS+ and DIAMETER provide access control
  • Recommend methods for securing SMTP, IMAP, POP and wireless networks
  • Identify threats to email and wireless communications
  • Describe how protocol analyzers and IDS/IPS applications monitor and protect network activity
  • Outline the basic steps involved in incident response and forensic analysis
Week 3
Security in Transmissions - Part 1
  • Classify the different types of IP addresses and address-translation strategies
  • Identify common wireless security tools and relate how 802.11 networks operate
  • Explain the role of Snort and honeypots in network intrusion detection (NID)
  • Summarize the best practices for handling digital evidence
  • Describe the attack methodologies for Trojans, backdoors, botnets, and DDoS and specify ways to mitigate these threats
Week 4
Security in Transmissions - Part 2
  • Specify the basic strategies behind the triad of attacks
  • Categorize the three primary types of password authentication
  • Identify various types of malware and social engineering techniques
  • State the full name and responsibilities of organizations more commonly known by their acronyms
  • Recommend ways to enhance password-based authentication
Week 5
Security in the Infrastructure - Part 1
  • Explain how the Kerberos authentication process operates
  • Identify and compare several major access control models
  • Diagram the layers of defense and specify the different types of access control for each layer
  • Cite the security concerns associated with social networking and peer-to-peer networking
  • Define attack terminology and outline the system hacking life cycle
  • Describe the processes involved in hardening an operating system and hardening applications
Week 6
Security in the Infrastructure - Part 2
  • Identify application vulnerabilities and strategies to overcome them
  • List key steps to enhancing the security of the software development life cycle
  • Explain the goals, processes and core elements of cryptography and steganography
  • Define common hashing algorithms and advanced cryptographic concepts
  • Describe how users gain remote network access via telnet, SSH and VPNs
  • Outline the basic IPsec configurations and email encryption protocols
Week 7
Operational Security - Part 1
  • Identify and contrast the three basic types of identity proofing
  • Define PKI and explain its use of digital certificates, digital signatures and key management
  • Specify common web server and browser vulnerabilities and propose countermeasures to address them
  • Outline the components and functions of the major web protocols: HTTP, SSL/TLS, HTTPS and LDAP
  • Describe the purpose of controls, and differentiate between operational, technical and physical controls
Week 8
Operational Security - Part 2
  • Describe the various tools and measures that can be implemented to harden a network
  • List the different types of specialized network devices and explain how they are used
  • Identify wireless vulnerabilities and implement strategies to combat them
  • Compare the channels used by IEEE 802.11 for wireless networking
  • Outline the steps involved in redundancy planning, disaster recovery and change management
  • Compare and evaluate the different kinds of logical access controls
Learning Objectives
Skills Learned
Cybersecurity Threat Assessment Risk Mitigation Security Policy System Management Process Development
What You’ll Study
  • Identifying Assets, Vulnerabilities, and Threats and Assessing Risk Mitigation Strategies
  • Naming and Describing Security Policies That Facilitate Compliance
  • How Protocol Analyzers and IDS/IPS Applications Monitor and Protect Network Activity
  • Listing and Explaining Three Types of Access Control and Six Authentication Mechanisms
  • Identifying Threats to Wireless Communications and Cloud Security
  • Evaluating Various Types of Firewalls and Other Network Security Tools
  • The Goals, Processes and Core Elements of Cryptography
  • The Attack Methodologies for Trojans, Backdoors, Botnets and DDoS, and Specifying Ways to Mitigate These Threats
  • The Basic Steps Involved in Incident Response and Disaster Recovery
Related Certificate Programs

Cybersecurity Certificate

20+ Weeks
3 Courses

Learn to assess risks and protect critical data from cyber threats.

Certification Prep

Who Should Register?

Mastering Cybersecurity/Security+ is designed for the cyber or IT security professionals interested in learning more in-depth information about the cyber security profession, as well as those interested in obtaining the CompTIA Security+™ certification.

Are you an experienced cybersecurity professional?
If you can answer “yes” to these questions, then you may be ready for Mastering Cybersecurity/Security+.  If not, then you should begin with Essentials of Cybersecurity.

  • Are you familiar with the most commonly used ports, protocols, and services?
  • Are you familiar with IT components such as Windows AD, DNS, and routers/switches?
  • Are you familiar with networking protocols such as TCP or UDP?

Tuition & Payment

Total Course Cost


Course offerings and associated prices are subject to change without prior notice. Pricing for multi-course certificate programs varies depending on course selection. View the Professional Education Catalog for more information on the courses and programs.

Payment Options

There are multiple ways to pay for your certificate program. Just let your enrollment representative know the choice that works best for you.