Why Pursue a Cyber Security Graduate Certificate
Upon completion of the Cyber Security certificate program at UTSA, students gain a fundamental knowledge of cyber security technologies that affect organizational operations, processes and decision-making. Students will also learn to demonstrate critical thinking by analyzing cyber security situations and constructing or selecting acceptable solutions to mitigate or eliminate problems. Additionally, program graduates will gain an appreciation of the legal and ethical environment impacting cyber systems and be able to recommend or implement solutions within the legal and ethical constraints present in the environment.
Do you have a BBA in Cyber Security from UTSA?
As this certificate is for non-cyber professionals, you will have already received this fundamental knowledge during your degree program. If you are considering graduate-level work in cyber, we recommend the Master of Information Technology with a concentration in Cyber Security (MSIT Cyber).
Please note: If you are pursuing your MSIT Cyber, you are not able to receive credit toward your degree from this Graduate Certificate.
Admission & Application Requirements
Applications are submitted through the UTSA Graduate Application. Please upload all required documents (listed below) on your UTSA Graduate Application. It is the applicant’s responsibility to ensure completion and submission of the application, a nonrefundable application fee, and all required supporting documents are on file with UTSA by the appropriate application deadline.
For international students, please note that student visas are not issued at UTSA for non-degree-seeking students, including certificate programs. For more information, visit our international students admission page.
|Cyber Security (CERT)|
|Required Degree||Bachelor's Degree from a regionally accredited college or university in the United States or have proof of equivalent training at a foreign institution|
|Minimum GPA||3.0 (on a 4.0 scale) departments may consider GPA of last 60 semester credit hours|
|Transcripts*||Required from all institutions attended; international transcripts must be recorded/translated to English|
|Credential Evaluation||Required if you have earned university-level credit from foreign institutions. Submit an evaluation of your transcripts from Educational Credential Evaluators (ECE) directly from the graduate admission application platform|
|TOEFL/IELTS Score||562 TOEFL Paper / 84 TOEFL Internet / 7 IELTS scores for International applicants (exempt countries). Scores are currently waived for this program through the 2023-24 academic year.|
|*Unofficial transcripts will be taken into consideration for admissions; however, if admitted into the program, you must submit official transcripts to the University.|
Applicants are encouraged to have their admission file completed as early as possible. All applications, required documents and letters of recommendation, if applicable, must be submitted by 5:00 PM U.S. Central Time on the day of the deadline. Deadlines are subject to change.
|Cyber Security (CERT)|
|Completed applications will be reviewed for admission on a rolling basis. Decisions generally will be made and sent to applicants within 4 to 6 weeks of receiving the application.|
|Priority||April 1||October 1||March 1|
|International||June 1||November 1||April 1|
|Domestic||July 15||December 1||April 15|
UTSA prepares you for future careers that are in demand. The possible careers below is data pulled by a third-party tool called Emsi, which pulls information from sources like the U.S. Bureau of Labor Statistics, U.S. Census Bureau, online job postings, other government databases and more to give you regional and national career outlook related to this academic program.
- Baptist Health System
- Booz Allen Hamilton
- Cyber Range Solutions
- Exxon Mobil
- Frost Bank
- Microsoft Corporation
- National Security Agency
- U.S. Air Force
- Valero Energy Corporation
- Cyber Law
- Digital Forensic Analysis I
- Industrial Control Systems
- Information Assurance and Security
- Information Assurance Policy
- Intrusion Detection and Incident Response
- Telecommunication Systems (required)
- Web Application Security