2025-2026 Academic Catalog

Print Options

Cybersecurity and Secure Computing Undergraduate Certificate

General Requirements

Students must satisfy all requirements as outlined below and by the department offering the certificate. 

  • Click here for information about Academic Policies

Certificate Requirements

Current students in good standing completing a BS or BA in computer science or a minor in computer science are eligible. Students completing a degree in cybersecurity are ineligible to complete this certificate. Applications from other majors at CU Denver or non-degree students will be evaluated based on their current transcript. The student's application is subject to the approval of the computer science and engineering department chair.

Students who want to complete the Cybersecurity and Secure Computing Undergraduate Certificate must apply using a Cybersecurity and Secure Computing Certificate intent-to-complete form

Students planning to pursue a Cybersecurity and Secure Computing Certificate in Computer Science and Engineering should apply as early as possible to facilitate course planning, and no later than census date of the semester prior to graduation with their undergraduate degree.

Process to Attain Certificate Objectives

The following classes need to be taken with a grade of C- or better:

CSCI 3761Introduction to Computer Networks3
CSCI 3453Operating System Concepts3
CSCI 4034Theoretical Foundations of Computer Science3
CSCI 4741Principles of Cybersecurity3
CSCI 4743Cyber and Infrastructure Defense3
Total Hours15

Students must take and pass each course with a grade of C- or better. The Cybersecurity & Secure Computing Certificate requires a minimum cumulative GPA of 2.0.

Learning Outcomes 

  • Be able to describe and apply the fundamental concepts of cybersecurity principles and techniques.
  • Be able to analyze potential cyber threats and attacks.
  • Be able to use cyber defense tools, methods, and components to properly secure systems.
  • Be able to effectively and quickly evaluate and mitigate if systems are threatened or compromised.