Online Information Security Graduate Certificate
Developing a strong information security program in today’s world is crucial and challenging for most organizations. In general, information security means protecting information from unauthorized access, disclosure, or destruction. Information security is essential because most organizations—including government agencies, hospitals, insurance companies, and private businesses—store various kinds of information about their employees and customers. If any business-related information is confidential, the security of that data becomes crucial. For example, if critical business data (e.g., credit card numbers or design documents) is leaked to competitors or hackers, it could lead to loss of business, lawsuits, and even bankruptcy. Organizations also need to be able to comply by standards and laws, such as HIPPA, PCI, and GLBA, which help protect confidentiality and privacy of customer data.
MET’s Information Security graduate certificate program touches upon various aspects of information security, including IT security policies and system security. Students also learn about digital forensics to help in investigating a security breach, and obtain a good understanding of how information is stored in a database and what services are available to protect it. On completing the graduate certificate, students will have sufficient skills in developing and implementing IT security in their organizations.
Students who complete the Graduate Certificate in Information Security will be able to demonstrate:
- Advanced knowledge of information security concepts, governance, biometric systems, and database systems security, as well as network security and cryptography.
- Proficiency in risk management, such as asset assessments, architectural solutions, modeling, and design.
- Competence in security policies, processes, technology, and operations.
Awards & Accreditations
Newsweek magazine ranked Boston University’s online programs #4 in the nation in its 2023 survey.
Why Choose BU’s Graduate Certificate in Information Security?
- Four-course certificate program comprises courses shared by the MS in Computer Information Systems, ranked #10 among the nation’s Best Online Master's in Computer Information Technology Programs (U.S. News & World Report 2025).
- Students benefit from a supportive online network, with courses developed and taught by PhD-level full-time faculty and professionals with hands-on expertise in the industry.
- Small course sections ensure that students get the attention they need, while case studies and real-world projects ensure that they gain in-depth, practical experience with the latest technologies.
Meet Dr. Suresh Kalathur, one of the faculty members you’ll work with in the Computer Information Systems program.
Career Outlook
Computer and Information Systems Managers
10% increase in jobs through 2029
$146,360 median annual pay in 2019
Computer and Information Research Scientists
15% increase in jobs through 2029
$122,840 median annual pay in 2019
Information Security Analysts
31% increase in jobs through 2029
$99,730 median annual pay in 2019
Bureau of Labor Statistics, U.S. Department of Labor, Occupational Outlook Handbook, 2020
Industry Trends
- Cybersecurity postings grew 91% from 2010 to 2014. This growth rate is faster than that of IT jobs generally.
- The fastest increases in demand for cybersecurity workers were in industries managing increasing volumes of consumer data such as Finance (+137% over the last five years), Health Care (+121%), and Retail Trade (+89%).
Burning Glass Technologies Job Market Intelligence: Cybersecurity Jobs, 2015
Best Technology Jobs, 2025 U.S. News & World Report
- #1 IT Manager
- #2 Software Developer
- #3 Information Security Analyst
- #4 Data Scientist
- #5 Actuary
- #6 Computer Network Architect
- #7 Operations Research Analyst
- #8 Computer Systems Analyst
- #9 Statistician
- #10 Web Developer
- #11 Database Administrator
- #12 Computer Support Specialist
- #13 Mathematician
- #14 Computer Systems Administrator
- #15 Computer Programmer
Tuition & Financial Assistance
Money Matters
Boston University Metropolitan College (MET) offers competitive tuition rates that meet the needs of part-time students seeking an affordable education. These rates are substantially lower than those of the traditional, full-time residential programs yet provide access to the same high-quality BU education. To learn more about current tuition rates, visit the MET website.
Financial Assistance
Comprehensive financial assistance services are available at MET, including scholarships, graduate loans, and payment plans. There is no cost to apply for financial assistance, and you may qualify for a student loan regardless of your income. Learn more.
Curriculum
Boston University’s Graduate Certificate in Information Security consists of four required online courses (16 credits).
Academic credits earned toward the online Graduate Certificate in Information Security may be transferred to the Master of Science in Computer Information Systems.
Courses
(Four courses/16 credits)
Choose four courses from the following list:
METCS674 Database Security
Graduate Prerequisites: CS 579 or CS 669 or consent of the instructor - The course provides a strong foundation in database security and auditing. This course utilizes Oracle scenarios and step-by-step examples. The following topics are covered: security, profiles, password policies, privileges and roles, Virtual Private Databases, and auditing. The course also covers advanced topics such as SQL injection, database management security issues such as securing the DBMS, enforcing access controls, and related issues. Prereq: MET CS 579 or MET CS 669; or instructor's consent. [4 credits]
METCS684 Enterprise Cybersecurity Management
This course covers important topics that students need to understand in order to effectively manage a successful cybersecurity and privacy program, including governance, risk management, asset classification and incidence response. Students are first introduced to cybersecurity & privacy policy frameworks, governance, standards, and strategy. Risk tolerance is critical when building a cybersecurity and privacy program that supports business goals and strategies. Risk management fundamentals and assessment processes will be reviewed in depth including the methodology for identifying, quantifying, mitigating and controlling risks. Asset classification and the importance of protecting Intellectual Property (IP) will prepare students to understand and identify protection mechanisms needed to defend against malicious actors, including industry competitors and nation states. Incident Response programs will cover preparation and responses necessary to triage incidents and respond quickly to limit damage from malicious actors. [4 credits]
METCS690 Network Security
Undergraduate Prerequisites: (METCS535 OR METCS625) or instructor's consent. - This course will cover advanced network security issues and solutions. The main focus on the first part of the course will be on Security basics, i.e. security services, access controls, vulnerabilities, threats and risk, network architectures and attacks. In the second part of the course, particular focus and emphasis will be given to network security capabilities and mechanisms (Access Control on wire-line and wireless networks), IPsec, Firewalls, Deep Packet Inspection and Transport security. The final portion of the course will address Network Application security (Email, Ad-hoc, XML/SAML and Services Oriented Architecture security. As part of our course review we will explore a number of Network Use Cases. Prereq: MET CS 535 or MET CS 625; Familiarity with OSI and TCP/IP protocol stack; Background-familiarity with binary numbers, prime numbers, binary- hexadecimal-decimal conversions, etc; Familiarity with computer programming concepts; or instructor's consent. [4 credits]
METCS693 Digital Forensics and Investigations
Provides a comprehensive understanding of digital forensics and investigation tools and techniques. Learn what computer forensics and investigation is as a profession and gain an understanding of the overall investigative process. Operating system architectures and disk structures are discussed. Studies how to set up an investigator's office and laboratory, as well as what computer forensic hardware and software tools are available. Other topics covered include importance of digital evidence controls and how to process crime and incident scenes, details of data acquisition, computer forensic analysis, e-mail investigations, image file recovery, investigative report writing, and expert witness requirements. Provides a range of laboratory and hands-on assignments either in solo or in teams. With rapid growth of computer systems and digital data this area has grown in importance. Prereq: Working knowledge of windows computers, including installing and removing software. Access to a PC meeting the minimum system requirements defined in the course syllabus. [4 credits]
DGTL FORENSICS [4 credits]
METCS693S Digital Forensics and Investigations
Prereq: working knowledge of Windows computers, including installing and removing software. Must have access to a personal computer that meets the minimum system requirements defined in the course syllabus. eLive offering. Provides a comprehensive understanding of digital forensics and investigation tools and techniques. Students learn what computer forensics and investigation is as a profession and gain an understanding of the overall investigative process. Operating system architectures and disk structures are discussed. Covers how to set up an investigator's office and laboratory, as well as what computer forensic hardware and software tools are available. Other topics include importance of digital evidence controls and how to process crime and incident scenes, details of data acquisition, computer forensic analysis, email investigations, image file recovery, investigative report writing, and expert witness requirements. Includes a range of laboratory and hands-on assignments either solo or in teams. [4 credits]
METCS694 Mobile Forensics and Security
Overview of mobile forensics investigation techniques and tools. Topics include mobile forensics procedures and principles, related legal issues, mobile platform internals, bypassing passcode, rooting or jailbreaking process, logical and physical acquisition, data recovery and analysis, and reporting. Provides in-depth coverage of both iOS and Android platforms. Laboratory and hands-on exercises using current tools are provided and required. [4 credits]
METCS694S Mobile Forensics
Overview of mobile forensics investigation techniques and tools. Topics include mobile forensics procedures and principles, related legal issues, mobile platform internals, bypassing passcode, rooting or jailbreaking process, logical and physical acquisition, data recovery and analysis, and reporting. Provides in-depth coverage of both iOS and Android platforms. Laboratory and hands-on exercises using current tools are provided and required. [4 credits]
Undergraduate Prerequisites: (METCS625) or instructor's consent - This course introduces fundamental concepts, principles of cybersecurity and their use in the development of security mechanisms and policies. Topics include basic risk assessment and management; basic legal and ethics issues, various cyber attacks, defense methods and tools; security principles, models and components; different crypto protocols, techniques and tools, including symmetric and asymmetric encryption algorithms, hashing, public key infrastructure, and how they can be used; security threats and defense to hardware, operating systems, networks and applications in modern computing environments. Hands-on labs using current tools are provided and required. Prerequisite: METCS535 or METCS625 or instructor's consent. [4 credits]
Undergraduate Prerequisites: (METCS625) or instructor's consent - ENTPR INFO SEC [4 credits]
Undergraduate Prerequisites: (METCS625) or instructor's consent - Prereq: (MET CS 535 or MET CS 625) or instructor's consent. Provides an in-depth presentation of security issues in computer systems, networks, and applications. Formal security models are presented and illustrated on operating system security aspects, more specifically memory protection, access control and authentication, file system security, backup and recovery management, and intrusion and virus protection mechanisms. Application level security focuses on language level security and various security policies including conventional and public keys encryption, authentication, message digest, and digital signatures. Internet and intranet topics include security in IP, routers, proxy servers, firewalls, application-level gateways, web servers, and file and mail servers. Discusses remote access issues, such as dial-up servers, modems, and VPN gateways and clients. [4 credits]
Admission & Prerequisite Information
Admissions
Visit the Metropolitan College Graduate application page to learn more and apply.
Prerequisites
Applicants are not required to have a degree in computer science for entry to a program within the Department of Computer Science. Upon review of your application, the department will determine if the completion of prerequisite coursework will be required, based on your academic and professional background.
A maximum of two graduate-level courses (8 credits) taken at Metropolitan College before acceptance into the program may be applied towards the certificate.
Eric Braude
Associate Professor and Director of Digital Learning, Computer Science
PhD, Columbia University; MS, University of Miami; MS, University of Illinois; BS, University of Natal (South Africa)
Lou Chitkushev
Associate Dean, Academic Affairs; Associate Professor, Computer Science; Director, Health Informatics and Health Sciences
PhD, Boston University; MS, Medical College of Virginia; MS, BS, University of Belgrade
John Day
Lecturer, Computer Science
MSEE, BSEE, University of Illinois
View all Faculty

Stu Jacobs
Lecturer, Computer Science
MS, Southern Connecticut State University; BS, University of Wisconsin, Madison
Suresh Kalathur
Assistant Professor, Computer Science; Director, Analytics
PhD, Brandeis University; MS, Indian Institute of Technology; BS, Regional Engineering College (Warangal, India)
Vijay Kanabar, PMP
Associate Professor, Computer Science and Administrative Sciences; Director, Project Management
PhD, University of Manitoba (Canada); MS, Florida Institute of Technology; MBA, Webber College; BS, University of Madras (India)
Jae Young Lee
Assistant Professor, Computer Science; Coordinator, Databases
PhD, MS, University of Texas at Arlington; BS, Seoul National University (Korea)
Robert Schudy
Associate Professor, Computer Science
PhD, MS, University of Rochester; BA, University of California San Diego
Victor Shtern
Associate Professor Emeritus, Computer Science
PhD, Leningrad Aluminum Institute (Russia); MS, Leningrad Institute of Technology; MBA, Boston University
Anatoly Temkin
Assistant Professor Emeritus, Computer Science
PhD, Kazan University (Russia); MS, Moscow University
Guanglan Zhang
Associate Professor and Chair, Computer Science; Coordinator, Health Informatics
PhD, MEng, Nanyang Technological University, Singapore; BS, Luoyang Institute of Technology
Yuting Zhang
Assistant Professor, Computer Science; Coordinator, Information Security
PhD, Boston University; MS, BS University of Science and Technology Beijing
Tanya Zlateva
Dean, Metropolitan College; Professor of the Practice, Computer Science and Education; Director, Information Security
PhD, Dresden University of Technology (Germany); MS, Dresden University of Technology; BS, Dresden University of Technology
Getting Started
To learn more or to contact an enrollment advisor before you get started, request information using the button below and tell us a little about yourself. Someone will be in touch to answer any questions you may have about the program and detail the next steps in earning your degree. You can also start your application or register for a course at Metropolitan College.