Dakota State University students walking around campus

Preparation + opportunity = success

That's the DSU equation. We're a four-year university with nationally recognized programs, cutting-edge facilities, and the brightest thinkers. But we're also a tight-knit, inclusive community. Small class sizes mean hands-on training and individualized attention. All this with an affordable, public school price that's among the best values in the region.

Majors & Degrees

Ethical Hacking Graduate Certificate

One step ahead

Industries throughout the world have information they need kept secure. With a certificate in ethical hacking, you can detect the flaws in security systems before hackers do.

Throughout this program, you have access to high-tech equipment and forward-thinking research. Step into the future, as you take a step into our homegrown virtual lab. Identify common security tools, features, and purposes. Perform realistic penetration tests, and harbor technical skills that allow advancement in the field of security assessment. Curriculum includes courses in network hacking, security management risks, and more.

Benefits

In this certificate program, you’ll be learning from nationally recognized faculty and using cutting-edge research and equipment. And nearly all of the courses use our homegrown virtual lab that provides the same learning experience for both on-campus and online students.

Prerequisites to Ethical Hacking Certificate

Students should have at least a Bachelor’s degree in mathematics, computer science, engineering or information security (or similar program). Students are required to have a basic knowledge of a C type programming language or other OOP (Object-Oriented Programming) language. Knowledge of Python and SQL (Structed Query Language) skills will be very helpful. Students should also be familiar with both Windows and Linux operating systems.

Learning outcomes

Upon completion of the Graduate Certificate in Ethical Hacking, students will:

  • Be able to identify common security tools and compare and contrast their features and purpose
  • Be able to perform a realistic penetration test
  • Have technical skills that will allow advancement in the field of security assessment

Related Programs