Skip To Main Content

Why Pursue a Cyber Security Graduate Certificate

Upon completion of the Cyber Security certificate program at UTSA, students gain a fundamental knowledge of cyber security technologies that affect organizational operations, processes and decision-making. Students will also learn to demonstrate critical thinking by analyzing cyber security situations and constructing or selecting acceptable solutions to mitigate or eliminate problems. Additionally, program graduates will gain an appreciation of the legal and ethical environment impacting cyber systems and be able to recommend or implement solutions within the legal and ethical constraints present in the environment.

Do you have a BBA in Cyber Security from UTSA?

As this certificate is for non-cyber professionals, you will have already received this fundamental knowledge during your degree program. If you are considering graduate-level work in cyber, we recommend the Master of Information Technology with a concentration in Cyber Security (MSIT Cyber).

Please note: If you are pursuing your MSIT Cyber, you are not able to receive credit toward your degree from this Graduate Certificate.

Admission & Application Requirements

Applications are submitted through the UTSA Graduate Application. Please upload all required documents (listed below) on your UTSA Graduate Application. It is the applicant’s responsibility to ensure completion and submission of the application, a nonrefundable application fee, and all required supporting documents are on file with UTSA by the appropriate application deadline.

For international students, please note that student visas are not issued at UTSA for non-degree-seeking students, including certificate programs. For more information, visit our international students admission page.

Cyber Security (CERT)
  Required Degree Bachelor's Degree from a regionally accredited college or university in the United States or have proof of equivalent training at a foreign institution
  Minimum GPA 3.0 (on a 4.0 scale) departments may consider GPA of last 60 semester credit hours
  Transcripts* Required from all institutions attended; international transcripts must be recorded/translated to English
  Credential Evaluation Required if you have earned university-level credit from foreign institutions. Submit an evaluation of your transcripts from Educational Credential Evaluators (ECE) directly from the graduate admission application platform
  TOEFL/IELTS Score 562 TOEFL Paper / 84 TOEFL Internet / 7 IELTS scores for International applicants (exempt countries). Scores are currently waived for this program through the 2023-24 academic year.
*Unofficial transcripts will be taken into consideration for admissions; however, if admitted into the program, you must submit official transcripts to the University.
Apply using 2021-22 Graduate Application Apply using 2022-23 Graduate Application

Admission Deadlines

Applicants are encouraged to have their admission file completed as early as possible. All applications, required documents and letters of recommendation, if applicable, must be submitted by 5:00 PM U.S. Central Time on the day of the deadline. Deadlines are subject to change.

Cyber Security (CERT)
Completed applications will be reviewed for admission on a rolling basis. Decisions generally will be made and sent to applicants within 4 to 6 weeks of receiving the application.
  Fall Spring Summer
Priority April 1 October 1 March 1
International June 1 November 1 April 1
Domestic July 15 December 1 April 15

Funding Opportunities

Resources

Career Options

UTSA prepares you for future careers that are in demand. The possible careers below is data pulled by a third-party tool called Emsi, which pulls information from sources like the U.S. Bureau of Labor Statistics, U.S. Census Bureau, online job postings, other government databases and more to give you regional and national career outlook related to this academic program.


  • Accenture
  • Apple
  • Baptist Health System
  • Boeing
  • Booz Allen Hamilton
  • Chevron
  • Cyber Range Solutions
  • Dell
  • Exxon Mobil
  • Frost Bank
  • Google
  • H-E-B
  • Microsoft Corporation
  • National Security Agency
  • Rackspace
  • SWBC
  • Target
  • U.S. Air Force
  • Valero Energy Corporation
  • Cyber Law
  • Digital Forensic Analysis I
  • Industrial Control Systems
  • Information Assurance and Security
  • Information Assurance Policy
  • Intrusion Detection and Incident Response
  • Telecommunication Systems (required)
  • Web Application Security

Contact Information

Jim Aviles

210-458-7315

james.aviles@utsa.edu