Loyola University Chicago

Quinlan School of Business

Cybersecurity Certificate

Online program for Quinlan graduate students

Quinlan graduate students have the unique opportunity to earn a certificate in cybersecurity from the University of Dallas (UD) Gupta College of Business, a nationally recognized leader in the field.

Graduates from UD’s cybersecurity programs are some of the most sought-after cybersecurity professionals in the nation.

Why cybersecurity?

Due to a growing dependency on information security, businesses are hiring more cybersecurity professionals. A recent report by the Bureau of Labor and Statistics found that jobs for information security analysts will continue to rise, with an expected increase of 28% percent from 2016 to 2026 with median salaries exceeding $90,000.

Cybersecurity studies also can lead to careers in areas such as threat analysis, cyber defense, network security, penetration testing, and digital forensics.

Why this cybersecurity certificate?

The program provides an understanding of the complexities in protecting and defending infrastructures and networks that contain valuable information. Key distinctions include:

  • National recognition: Since 2003, UD has been designated a National Center of Academic Excellence in Cyber Defense Education by the National Security Agency and Department of Homeland Security.
  • Real-world curriculum: UD’s cybersecurity course content is created with expert data from the NSA, NIST, UD’s Cyber Advisory Council, and highly qualified academic and professional cybersecurity professors.
  • Top rankings: UD’s program is No. 6 on Best College’s list of the Top 25 Online Master's in Information Systems Security Programs for 2018.
  • Best of two schools: You are earning a credential from a top cybersecurity program, while remaining a Loyola business student.

About the cybersecurity certificate

The online cybersecurity certificate is a graduate-level, five-course program that provides the foundational skills and knowledge for strategic cybersecurity management.


TECH 5F70: This course examines the global issues facing IT and Cybersecurity organizations today by providing an understanding of IT infrastructure, services, and technologies for competitiveness, efficiency, and effectiveness.  Students investigate security threats faced by enterprises through the tenets of cybersecurity of confidentiality, integrity, availability, and governance.  

CYBS 5F70: This course provides an introduction to the study of cybersecurity and the need to maintain confidentiality, integrity and availability of information. Students will be introduced to cyber laws and governance issues, risk management, security tools, security awareness and the ongoing responsibilities associated with maintaining a secure organization.

Provides a working knowledge of fundamental data protection techniques for protecting data at rest, data in motion, and data in processing. Techniques include encryption algorithms and systems (symmetric, asymmetric, standard, digital certificates, and hashes), Steganography, data masking, and data obfuscation. Examines access controls, availability, authentication, confidentiality, data integrity, and non-repudiation as well as defenses against DDOS and other data attacks. Security by diversity and security in depth are presented as fundamental requirements. 

Examines legal, privacy, and compliance environments facing organizations globally. Students build an understanding of the complexities of security, compliance and legal obligations starting with a general foundation of laws and industry standards that apply across most organizations that handle sensitive data. Examination of industry verticals expand students’ knowledge of particular federal and state regulatory and industry-based obligations. It also examines how security and compliance obligations can be used to establish the security, compliance, and risk management programs for an enterprise.  Equivalent to TECH 6355.

Focuses on developing skills relative to an understanding of the business risks that exist when proper cybersecurity access controls are not effectively implemented. Students will study breach cases and have the opportunity to interface with security experts to gain an in-depth understanding of current risks, threats, and vulnerabilities organizations face.  Lab simulations will be completed and each lab will be analyzed for its meaning and purpose in increasing security knowledge. Students will create a cybersecurity breach report and as a team project create an access control plan with recommendations for overcoming or minimizing cyber breach situations through the use of proper controls, the control framework, lab experiences, and other resources explored in the course. Co-requisite: CYBS 6350. Equivalent to TECH 7350.

Provides a comprehensive explanation of network security basics including how hackers access networks and the use of network security tools to provide countermeasures. Strategies for meeting the challenges from expanded network boundaries are developed through active hands-on exercises in networked lab environments. Prerequisite: CYBS 5F70 and CYBS 6350. 

Program structure

Courses are scheduled to enable completion of the certificate in as fast as 4 trimesters, with students beginning the course sequence in fall or spring. Sessions meet once per week for 12-weeks on the following schedule. All courses are online.

Fall Start

Fall  Late August Mid November CYBS 5F70: Foundations of Cybersecurity
Spring  Late January Mid April CYBS 6350: Data Protection AND
CYBS 7350: Operational Cybersecurity Management
Summer  Early June Mid August CYBS 6355: Compliance and Legal Issues
Fall  Late August Mid November CYBS 7357: Network Security

Spring Start

Spring Late January Mid April CYBS 5F70: Foundations of Cybersecurity
Summer Early June Mid August CYBS 6350: Data Protection
Fall Late August Mid November CYBS 6355: Compliance and Legal Issues AND
CYBS 7350: Operational Cybersecurity Management 
Spring Late January Mid April CYBS 7357: Network Security


Earn microcredentials

Upon successful completion of required coursework, students receive a verified University of Dallas microcredential in “Cyber Operations.”

Microcredentials demonstrate mastery of in-demand skills to potential future employers. They can be displayed with a special digital badge from the University of Dallas on your LinkedIn account and resume. Through Acclaim, your accomplishment can be verified by employers and hiring managers.

Application and tuition

Admitted and current Quinlan students: Apply for the certificate program on your application status page.

Apply by August 1, 2021 for a fall 2021 start. The anticipated cost for the five courses is $13,680.

Non-Loyola students: Visit UD’s Cybersecurity page for details on all cybersecurity programs offered at the University of Dallas.