Cloud Security and Governance Certificate

The benefits of cloud-based systems, data and infrastructure come with a new set of risks that require an innovative approach to cloud security. Earn a Cloud Security and Governance certificate to strengthen your network’s ability to defend against threats.

Enroll

Certificate Overview

The Cloud has completely changed the way we share and exchange information. While the convenience of the Cloud provides new business models, creates new opportunities and sets the stage for further innovation, the Cloud also presents new risks, new governance challenges and a need to fundamentally rethink the way we operate.

With the Cyber Tech Academy Cloud Security and Governance certificate, you’ll review traditional cyber principles in the context of the Cloud and explore new adaptations security professionals need to unlock the value of the Cloud while managing the risk.

Enroll

Modality

100% Online


Estimated Time to Complete

14 Weeks*

*Students have up to one year to complete the certificate from the time of registration.


Tuition: $5,000 with a 10% discount if you pay in full


Instructor

Eric Nielsen

Career Projections

33

PERCENT

Projected employment growth for information security analysts by 2030 (U.S. Bureau of Labor Statistics, 2021)

$76,877

AVERAGE BASE SALARY

For cyber security professionals (Payscale, 2022)

3.5

MILLION

Projected number of unfilled cyber security jobs globally by 2025 (Cybersecurity Ventures, 2021)

Certificate Outcomes

Over the course of your certificate, you will explore a range of Cloud models, risk, response and mitigation strategies. At the conclusion of your certificate, you will:

  • Possess a strong foundation in both theory and practice.
  • Differentiate between fundamental characteristics of Cloud and other service, deployment and responsibility models.
  • Determine and communicate risks and threats particular to the Cloud along with frameworks, Maturity Models and standards relevant to the Cloud.
  • Distinguish how governance tools like risk registers, audits and pen testing operate differently in the Cloud and implement tools accordingly.
  • Identify the increased importance of third-party attestations like STAR, FedRAMP and SOC 2.
  • Appraise Third-Party Risk Management (TPRM), Operational Resilience (OR) and the Incident Response (IR) in the Cloud.

Explore Our Other Certificates

A globe with a padlock indicating encrypted geo-tagging data.

Artificial Intelligence for Cyber Security

Learn More
Cell phone conducting thumbprint identification scan.

Cyber Governance and Risk Management

Learn More
A medical chart with a lock indicating a secure medical file.

Cyber Security in Healthcare

Learn More
An icon of a grid with a lock in the center inside of a circle

Ethical Hacking

Learn More

REQUEST INFORMATION

Bachelor’s degree or work equivalent required.
By submitting this form, I agree to be contacted via email, phone, or text to learn more about the programs at San Diego State University.