Skip to Main Content

This site provides information using PDF, visit this link to download the Adobe Acrobat Reader DC software.

Chat with TESU

Graduate Certificate in Cybersecurity - Critical Infrastructure

Stand out as a leader who can swiftly navigate the ever-changing field of cybersecurity for major utility infrastructures. Utilities have unique security requirements given their use of geographically distributed high-performance networks, and requirements for safety, reliability and compliance standards. Designed by top cybersecurity professionals in the utilities industry, our Graduate Certificate in Cybersecurity – Critical Infrastructure from Thomas Edison State University (TESU) provides you with the specialized skills necessary to help secure critical infrastructure systems, such as power grids and water purification systems.

As technology evolves, so do the career opportunities for those with a formal education in cyber threat mitigation. According to the U.S. Bureau of Labor Statistics, employment of information system analysts is expected to grow by 32 percent through 2032.

Our unique 15-credit online program:

  • Blends information technology (IT) and operational technology (OT)
  • Focuses specifically on critical infrastructure sectors including energy, water, gas and transportation
  • Can be completed in less than a year

Learning Outcomes

Upon graduating from this certificate program, you will be able to:

  • Investigate cybersecurity risks based on ranking criteria
  • Apply appropriate models for security risk mitigation
  • Analyze new technology and identify/develop solution sets for cybersecurity vulnerability concerns
  • Construct research-based recommendations to resolve security incidents and mitigate vulnerabilities and threats
  • Develop cybersecurity solution requirements for IT/OT vendors and suppliers
  • Incorporate industry best practices for existing and future systems
  • Implement security controls as defined by industry standards and cybersecurity frameworks
  • Integrate security into the entire system life cycle (planning, architecture, design, development, implementation/operation, maintenance and disposal)