100% online and
self-guided program

Learn from Dr. Cohen,
Father of Computer Virus

Kickstart your career with a Certificate in

Cybersecurity Overview


Certificate from
Webster University

Earn 45 CPE Credits


Starts On

8-Weeks, Online
Total of 45-60 hours

$ 699.00
Introductory offer


Cybersecurity Landscape

High Demand

Companies are losing millions of dollars to network attacks. They’re fighting back by hiring cybersecurity experts.

More Talent Needed

Demand for cybersecurity talent far exceeds supply. That means less competition and more pay for people like you.

Bright Future

3.5 million unfilled cybersecurity jobs projected by 2022. Unlike many others, the cybersecurity jobs are not going away.

Key Information

  • Perfect for students preparing to gain fundamental knowledge of Cybersecurity and its implications in real life.
  • Get a certificate from the highly respected Webster University, accredited in USA, Europe, and Asia
  • The course is developed and taught by Dr. Cohen, perhaps the most acclaimed cybersecurity expert of our time
  • 100% online, self-guided program with TA-assistance
  • Takes about 45-60 hours to finish at your own pace over 8-weeks


"I took this Cyber Security course as a final year MCA (Master of Computer Applications) student. It is well structured with top quality content and hands-on labs. The employability focus is really helpful, and I am now confidently interviewing for a job in cybersecurity space. Thank you!"

Harsha B., India

"I found the course to be comprehensive and flexible. It has really increased my awareness of this critical topic. Whether you have a foundation in cybersecurity or not, this course is easy to follow and will help you better understand the current landscape."

Adit Sachde, Atlanta, USA

"I took the Network-Attack-Detection course taught by Dr. Cohen, a world-class authority. The experiential learning using cyberlabs and real-life case-studies helped me with my part-time job at a cybersecurity startup. I strongly recommend it for those wanting to build a career in cybersecurity."

Juan Esteban Sierra, Colombia

Course Curriculum

  • Basic issues & implications
  • What to do about them?
  • How the business works, Duty to protect
  • Risk-management, Security-management
  • Control-architecture, and Technical security-architecture
  • Decision-Process
  • Cyber-Lab Sample
  • Quiz
  • Introduction
  • Critical-Infrastructure
  • IT Versus OT
  • Management Versus Technology
  • Quiz
  • Introduction
  • Medical-Healthcare Case Study
  • Water Case Study
  • City-power and Tribal-investments case-study
  • City Government Case Study
  • Banking & Financial Services
  • Cyber Board Game Startup Case Study
  • Quiz
  • Introduction
  • Chris Blask: Organizing-Cybersecurity
  • Dr. Jennifer Bayuk: Risk-Analysis
  • Prof. Lucina Duranti: Records Management
  • Dr. Alana Maurshat: Ethical Hacking
  • Quiz

Dr. Fred Cohen

Meet your faculty, Dr. Fred Cohen

  • Scientist who first defined the term "Computer Virus" and came up with most of the early virus defense mechanisms
  • One of the very few cybersecurity experts in the world, recognized as a fellow of (ISC)2
  • Authored more than 200 research articles and several books on information protection
  • Was named the "most famous hacker of all time” by ABC News in 2009
  • 40+ years of experience in cybersecurity
  • Ph.D. in Electrical Engineering (University of Southern California), MS in Information Sciences (University of Pittsburgh), and a BS in Electrical Engineering (Carnegie-Mellon University)



Land a lucrative job in Cybersecurity upon completing this course.


Get a Certificate from the reputed Webster University, accredited in USA, Europe, Asia.


Cybersecurity jobs are one of the few future-proof areas, with ever-increasing demand.

So what are you waiting for?


Frequently Asked Questions and Answers

Who should take this course?

This course is for you if you are a student seeking sound knowlegde in the field of cybersecurity, or an employee interested in up-skilling/re‐skilling knowlegde in cybersecurity.

Are there any prerequisites for this course?

There are no prerequisites to take up this course but basic understanding of computers general, would be helpful.

What are the equipment and technical requirements of this program?

The participants need to have a computer with Internet access, and an internet browser to access this course. No special software is required except for a PDF viewer.

What is required to successfully complete this course?

A participant must score at least 70%, in all the quizzes. We want you to do well in the quizzes, learn and benefit from the course. Once you are enrolled, you can refer to the video on “How to take the tests and do well in them?” in the orientation module.

In case you cannot do well in a quiz on the first attempt, no worries. You can go through the required sections of the course again and retake the quiz. You will get a maximum of 3 attempts to “pass” a quiz.

What are the duration and the time commitment required for this course?

The duration of the course will be 8 weeks. Students are expected to dedicate 45-60 hours in total to complete the course. This is a self-directed online program and hence you are free to decide when you want to study during these 8 weeks.
Note: You will have an additional 2 weeks to review what you have learned. That means that you will have a total of 10 weeks of access to the course content.

Who will I learn from?

You will learn from Dr. Cohen who has 40+ years of experience in cybersecurity academia and industry.
Following are some of the highlights of his accomplishments and background:

  • First defined the term “Computer Virus” and invented most of the widely used computer virus defense techniques
  • Won several international awards for his work in Cybersecurity
  • Did seminal research in the use of deception for information protection
  • His “Deception for Protection” series of papers is widely cited, and the techniques he pioneered are now in global use
  • A leader in advancing the science of digital forensic evidence examination
  • Top-flight information protection consultant and industry analyst for many years
  • Authored more than 200 invited, refereed, and other scientific and management research articles
  • Wrote monthly articles on cyber since 1995 and wrote several books on information protection
  • His “Enterprise Information Protection Architecture”, “Challenges to Digital Forensic Evidence”, and “Digital Forensic Evidence Examination” are used in graduate classes and other venues worldwide
  • Leading security practitioners around the globe have used his “Chief Information Security Officers ToolKit” series of books and booklets
  • His “Frauds Spies and Lies and How to Defeat Them” book has been the subject of radio talk shows
  • The research community has widely used his series of “Infosec Baseline” studies as stepping off points for further research
  • His “50 Ways” series is very popular among practitioners looking for issues to be addressed
  • His “World War 3 … Information Warfare Basics” is highly regarded among the thinkers in this arena
  • Founded the College Cyber Defenders program at Sandia National Laboratories that ultimately led to the formation of the CyberCorps program
  • Was named the “most famous hacker” of all time by ABC News in 2009
  • Has a Ph.D. in Electrical Engineering (University of Southern California), MS in Information Sciences (University of Pittsburgh), and a BS in Electrical Engineering (Carnegie‐Mellon University)

Do I receive a certificate for this course?

Upon successful completion of the course, you will receive a certificate of completion from Webster University. You need to score at least 70% to successfully complete this course.

When and how do I receive the certificate?

You will receive a digital certificate within two weeks after your successful completion of the course.

What are the accepted payment methods for this course?

We accept all major credit and debit cards. You may also pay with PayPal. If you encounter any challenges please contact support@iZen.ai

Does the program fee include taxes?

Yes, the program fee is inclusive of any taxes.

What is your refund policy?

Once you enroll into the program, you will not be eligible for any refunds

Do I need to buy any textbooks for this course?

No. E-books and all required resources are provided in this course and you can access them online.

Whom do I contact if I have more questions?

Please send all your queries to support@iZen.ai


© iZen ai, Inc.