Online Certificate in Cybersecurity for Cyber-Physical Systems

Online Certificate in Cybersecurity for Cyber-Physical Systems

The job market for computer scientists continues to be exceptionally strong, with the U.S. Department of Labor Statistics forecasting 15% growth in the field through 2029. But demand for cybersecurity specialists is expected to grow even more (+32%) over the same period.  

Built and led by leading faculty and researchers at Mines, the online Cybersecurity certificate is built for serious students interested in gaining the skills necessary to enter or advance in a wide range of cybersecurity roles and the industries and businesses that rely upon them.   

Quick Facts

32 weeks

Completion time

August 1

Application deadline

100%

All courses online

August 23

Program begins

+32%

Projected job market growth

$11,988

Program cost

Founded in 1874, Colorado School of Mines is a world-renowned public research university focused on science and engineering, where students and faculty together address the great challenges society faces today—particularly those related to the Earth, energy and the environment.

Students from 80 countries are enrolled in more than 40 graduate programs and 17 undergraduate majors on campus in Golden, Colorado, as well as online.

Let us tell you more

Loading...

Meet the Faculty

Qi Han

Qi Han

Professor, Computer Science

Chuan Yue

Chuan Yue

Associate Professor, Computer Science

Shane McFly

Shane McFly

Cybersecurity Research Scientist, National Renewable Energy Laboratory

The Classes

CSCI 560 – Fundamentals of Computer Networks   

This fully online course provides an introduction to fundamental concepts in the design and implementation of computer communication networks, their protocols, and applications. Topics include overview of network architectures, applications, network programming interfaces (e.g., sockets), transport, congestion, routing, and data link protocols, addressing, local area networks, wireless networks, and network security. Examples are drawn primarily from the Internet (e.g., TCP, UDP, and IP) protocol suite.  

CSCI 574 – Theory of Cryptography  

Students will draw upon current research results to design, implement and analyze their own computer security or other related cryptography projects. The requisite mathematical background, including relevant aspects of number theory and mathematical statistics, will be covered in lecture. Students will be expected to review current literature from prominent researchers in cryptography and to present their findings to the class. Particular focus will be given to the application of various techniques to real-life situations. The course will also cover the following aspects of cryptography: symmetric and asymmetric encryption, computational number theory, quantum encryption, RSA and discrete log systems, SHA, steganography, chaotic and pseudo-random sequences, message authentication, digital signatures, key distribution and key management, and block ciphers.  

CSCI 585 – Information Security and Privacy   

This course provides an introduction to the principles and best practices in information security and privacy. Lectures will include basic concepts of information security and privacy, fundamental security design principles, major topics in security and privacy, essential knowledge and skills, risk assessment and mitigation, policy development, and so on. In the classroom, students will also present and discuss a list of recent or classic research papers corresponding to the major topics in security and privacy. Outside of the classroom, students will work on homework assignments, security lab exercises, quizzes, research paper summaries, and a course project. 

CSCI 587 – Cyber Physical Systems Security  

This course aims to build a solid foundation for students to identify, analyze, and evaluate real-world security and privacy problems in Cyber Physical Systems, as well as to design and develop secure and usable solutions for addressing these problems. It focuses on the important security and privacy research topics in representative Cyber Physical Systems such as wireless sensor networks, smart grids, autonomous automotive systems, and robotic systems. It also includes the discussion of the protection of the nations critical infrastructures such as Food, Health, Water, Energy, Finance, Communication, Manufacturing, Government, and Transportation. The format of the course includes introductory discussions, research paper reading, summaries, and discussions, as well as research projects.  

About Mines

One of the World's Best, in Golden

Mines offers opportunities to engineer solutions to the world’s most pressing challenges, in a setting that’s hard to beat

Focused on Your Future

We are among the top universities in the U.S. for return on investment, immediately after graduation and decades into the future

A Unique Name for a Unique University

Mines has always been a bit different, so if you’re excited to do something new and big, we should be on your list