Certificate of Advanced Study
in Information Security Management

Earn Your Certificate of Advanced Study in Information Security Management

Syracuse University offers a Certificate of Advanced Study (CAS) in Information Security Management, designed for professionals seeking to deepen their expertise in protecting digital assets and managing cybersecurity challenges.

The curriculum is ideal for those already working in IT, cybersecurity, or related fields, as well as students pursuing graduate degrees who wish to enhance their credentials.

  • Students can tailor the 15-credit program to their expertise in areas like technology, policy, and risk management.
  • The program integrates law and technology to provide a well-rounded education.
  • Credits can count toward a master’s degree at the iSchool.
  • Earn credentials from a program recognized as a National Center of Academic Excellence
Program Info
Clock

Next term starts: 

Spring 2025

15

Total Credit Hours

Laptop

Program Delivery: 

On-campus and online

5

Courses

 
Admissions Requirements
  1. Complete the Graduate Program Application – Submit your application through the Graduate Program Application portalAfter submission, you’ll receive an email confirmation from Syracuse University.
  2. Pay the Application Fee – A non-refundable fee of $75 is required. If you’re applying to multiple programs, each requires a separate application and fee. Post-9/11 veterans may qualify for a fee waiver; contact the Veterans Resource Center at veterans@syr.edu for details.
  3. Submit Academic Transcripts – Provide one copy of transcripts from all postsecondary institutions you’ve attended. While unofficial transcripts are acceptable for initial review, official transcripts confirming a U.S. bachelor’s degree (or equivalent) are necessary upon admission.
  4. Write a Personal Statement – In approximately 500 words, discuss your academic and personal interests, relevant experiences, reasons for choosing this degree and Syracuse University, and your future plans post-graduation.
  5. Obtain One Letter of Recommendation – Request one letter from individuals who can assess your qualifications.
  6. Consider Exam Scores – Submitting GRE scores is optional.
  7. Provide a Current Resume or Curriculum Vitae (CV) – Include an up-to-date resume or CV with your application.
 
Program Learning Outcomes
  • Critically assess how technical aspects, policies, ethics, and diverse user behaviors impact information security.
  • Assess and articulate the implementation of information security measures across complex hardware, software, data, and network infrastructures.
  • Oversee the interplay between technical security measures, management considerations, policy frameworks, ethical issues, and user behaviors to maintain organizational operations and data integrity.
  • Craft and present effective professional communications pertinent to information security management.
 
How to Apply
  1. Gather Required Documents
  2. Complete the Graduate Program Application:
    • Visit the Graduate Program Application portal on the Syracuse University website.
    • Create an account and fill out your personal information, educational background, and program-specific details.
  3. Submit Supporting Documents
  4. Pay the Application Fee
  5. Track Your Application

Contact the Enrollment Management team at iGrad@syr.edu with further questions or for 

assistance. A member of our team will be happy to assist you.

 

What Can You Do with a CAS in Information Security Management?

As businesses and organizations continue to prioritize cybersecurity, the demand for skilled professionals in this field is at an all-time high. This certification equips you with the expertise to protect critical information and lead the charge in securing digital landscapes.

So, what could your next career move look like? Here are some possibilities:
  • Information Security Analyst
  • Cybersecurity Consultant
  • IT Security Manager
  • Risk Management Specialist
  • Network Security Administrator
  • Compliance Officer
  • Security Operations Center (SOC) Analyst
  • Chief Information Security Officer (CISO)

Courses & Curriculum

The Certificate of Advanced Study (CAS) in Information Security Management (ISM) offers a comprehensive set of skills for information security management, enabling students to take a lead role in the area within their organizations. The 15-credit CAS provides students with the flexibility to take coursework that does not overlap with their current expertise but gives them tools in information security technology, policy, risk management, and evaluation, depending on their background.

Required Core- 3 Credits

IST 623 | 3 CREDITS
Basic concepts and technologies of information security. Students who successfully complete this course will have a comprehensive overview of information security with some hands-on experience.

Secondary Core – 9 credits

Students need to choose three class from the list below

IST 602 | 3 CREDITS
Examination of information technology to establish probative information. Fundamentals of the forensic process, evidence handling and quality assurance as these apply to digital forensics.

IST 625 | 3 CREDITS
A multidisciplinary perspective of risk assessment, modeling, and management. Topics include: concepts of personal accountability versus governance and policy; how organizations define and measure risk and loss; and plan for contingencies.

IST 634 | 3 CREDITS
Security technologies and management in networked/Internet environments with hands-on skills and research opportunities. This course provides students with the concepts, threats, and key components of network security with technologies and effective management.
PREREQ IST 623

IST 636 | 3 CREDITS
This course is intended to cover today’s leading issues and challenges in information security, considering social, ethical, management, and global perspectives that are related to current technology trends.
PREREQ IST 623 OR IST 323

IST 704 | 3 CREDITS
Applications of information security including hands-on experience. Students who successfully complete this course will understand how information security technology is applied to real systems.
PREREQ IST 623 OR IST 323

IST 728 | 3 CREDITS
Designed for business, law, and technology students interested in information security as it impacts the management and operations of business and government. Information security policy and best business practices.

Technology Security (3 Credits)

CSE 643 | 3 CREDITS
Operating system security. Unix security. Trusted Computing Base. Authentication. Access control. Security models. Capability. Sandboxing. Software vulnerabilities. Worms. Viruses. Secure engineering principles. Secure programming. Auditing. Forensics.

CSE 644 | 3 CREDITS
Internet architecture. Security and attacks on TCP/IP, DNS, and BGP protocols. Internet protocol security. Firewall. Intrusion detection. Network traceback. Web security. Encryption. Public Key infrastructure. One-way harsh function. Digital signature. Security protocols.

IST 634 | 3 CREDITS
Security technologies and management in networked/Internet environments with hands-on skills and research opportunities. This course provides students with the concepts, threats, and key components of network security with technologies and effective management.

IST 636 | 3 CREDITS
This course is intended to cover today’s leading issues and challenges in information security, considering social, ethical, management, and global perspectives that are related to current technology trends.

IST 704 | 3 CREDITS
Applications of information security including hands-on experience. Students who successfully complete this course will understand how information security technology is applied to real systems.

Electives – 3 credits

Students can choose one course from the list below, or any additional course from the secondary core. Courses and Independent studies in related areas can be petitioned to count as an elective.

IST 615 | 3 CREDITS
Focus on understanding cloud management principles and practices, cloud service models (IaaS, PaaS, SaaS) and deployment strategies (public, private, hybrid), as well as key concepts like scalability, security, and cost optimization. Practical experience in using, creating and managing cloud services.

IST 618 | 3 CREDITS
Public policy and the data, library, and information technology sectors. Access, ethical and responsible artificial intelligence, privacy and security, intellectual property, and freedom of expression. Application of economic, legal, and political science concepts to information policy analysis.

IST 659 | 3 CREDITS
Definition, development, and management of databases for information systems. Data analysis techniques, data modeling, and schema design. Query languages and search specifications. Overview of file organization for databases. Data administration concepts and skills.

IST 714 | 3 CREDITS
Hands-on enterprise cloud-native software defined network and application/service design,  planning and economics; migration/adoption costs, data center resource orchestration. Topics also include cloud elastic sizing, risk management, governance, compliance and data monitoring, and security architecture.

Frequently Asked Questions

Who is this program designed for?

This program is designed for those eager to undertake leadership roles in cybersecurity and gain expertise in information assurance and cyber defense.

Is the CAS in information security management worth it?

Yes, this certificate is highly valuable for professionals aiming to advance their careers in cybersecurity. It provides in-depth knowledge and practical skills that are in high demand, helping graduates stay competitive in the field.

Can I take this program online?

Yes, this certificate is offered both on campus and online.

Questions? We’re here to help.

Get access to upcoming events, meet with faculty and current students, connect with alumni, and see what a master’s degree can do for your career and future. Submit your contact info below and we’ll be in touch!

Loading…