Skip to main content

Data Science with Concentration in Cybersecurity

digital-data-abstract-photo-with-digital-lock

Learn how to harness the power of big data and protect technological infrastructures in this nine-course certificate program.

Courses
9 Required
Methods
Online
F-1 Visa Eligible

Get More Info

 

This program is perfect for...

Multidisciplinary professionals seeking to learn or enhance data analytics skills
IT professionals expanding their areas of expertise to include cybersecurity
Aspiring data scientists looking to build skills in data management, visualization, and programming
International students aiming to maintain full-time status while learning in-demand skills in technical fields
Tech workers interested in learning about infrastructure, securing networks, and defending against cyberattacks

What you can learn.

Learn foundational tools and techniques for analyzing data, delivering insights, and building forecasting models
Gain expertise in Python, exploratory data analysis (EDA), and advanced data visualization, using R and Tableau
Understand the management of big data, types of NoSQL data stores, and the Hadoop ecosystem
Discover how to create security policies, risk assessments, disaster recovery plans, and post-attack protocols and procedures
Explore concepts needed for the CompTIASecurity+ and other certifications
Get hands-on experience with OSI stack security, hacking methodology and mitigation, penetration testing, and defensive strategies

Data fundamentals and protection.

Build the foundation for a career in data science while developing complementary skills for mitigating cybersecurity risks. Learn big data management, programming, and analysis, as well as how to protect and defend against cyberattacks.

The UCLA Extension Certificate in Data Science with Concentration in Cybersecurity was created to offer skills from two in-demand specialties in one combined environment.

Formats: Online or In-Person
Duration: 3 quarters full-time; 2 years part-time

person-in-front-of computer-with-another-person-in-background-on-computer

This certificate is approved for international students to study full time in the U.S. on an F-1 visa.

International students must meet English language proficiency requirements for admission into the program.

While most certificate programs begin each quarter, some have limited intakes for students studying on F-1 visa. Find this program on the Browse Certificate Programs page to confirm entry quarters before applying.

Learn more:

Get Started

Step 1: Enroll in a Course
Courses in this program are open enrollment and paid for individually. You may take courses without committing to the program.
Step 2: Become a Candidate
Establish candidacy in the program to receive tailored information, lock in course requirements, and access exclusive student benefits. Registration fees vary by program and are listed under Cost and Fees.
Important Note for International Students: Candidacy fees are included in your program fees and do not need to be paid separately.

Cost and Fees

All courses in this program are paid for individually, unless otherwise noted. An application form is required to establish candidacy in this program. From the 'Apply Now' button, complete the online application and pay the application fee if applicable.
Application and Candidacy Fee
$200
Estimated Textbooks and Materials
$1000
Estimated Program Tuition
$9855

International Student Fees format icon

Payment Options

  • Not eligible for VA Benefit
  • Federal Financial Aid is not available

Required Courses

Customize your experience
COM SCI X 420.5

Network, Operating System and Database Security

This course delivers a step-by-step methodology for securing any infrastructure through enhanced defenses to the core components of networks and databases.
COM SCI X 420.9

Cybersecurity Lab (Defensive Tools)

This hands-on course introduces core defensive strategies for various environments and explores remediation strategies for thwarting attacks.
COM SCI X 420.8

Cybersecurity Lab (Offensive Tools)

This hands-on course explores common and specialized security tools for penetration assessments. Students will have the opportunity to create their own custom tool or an extension to a known tool.

Machine Learning Course

Students must complete one of the following courses.
professional looking at a computer screen with alot of data

Explore Your Options

Looking for a shorter, specialized program? Explore our more targeted certificates in these two in-demand fields:

Related Programs

systems-analysis-ce0042

Systems Analysis

certificate
certificate This certificate provides training in analysis and design of information systems. The program prepares students to perform information systems requirements analysis, design, development, installation, and operation as well as testing and documentation. Courses include computer network communication protocol TCP/IP, database management, network security, and operating systems. Formats: Online, In-Person

This certificate provides training in analysis and design of information systems. The program prepares students to perform information systems requirements analysis, design, development, installation, and operation as well as testing and documentation. Courses include computer network communication protocol TCP/IP, database management, network security, and operating systems. Formats: Online, In-Person