Search

Chat With Us

    National Security Agency
    Go to Pennsylvania State University
    Pennsylvania State University

    National Security Agency

    Pennsylvania State University

    Pennsylvania State University

    flag

    United States of America, University Park

    University RankQS Ranking
    90

    Key Facts

    Program Level

    Certificate

    Study Type

    Full Time

    Delivery

    On Campus

    Course Code

    NSA_UCT

    Application Fee

    USD 75 

    Campuses

    Main Site

    Program Language

    English

    Start & Deadlines

    Next Intake DeadlinesJune-2023
    Apply to this program

    Go to the official application for the university

    Duration 1 year(s)
    Tuition Fee
    USD 53,135  / year
    Next Intake June-2023

    National Security Agency

    About

    Penn State and the College of Information Sciences and Technology are designated as a national Center of Academic Excellence (CAE) in Cyber Defense by the National Security Agency and the Department of Homeland Security. As such, the College of IST is authorized to grant security certificates of recognition and achievement to graduating students who meet certain academic criteria. The certificates certify that the student graduated from an institution and program whose faculty, resources, curricula, and commitment were evaluated and found to be of high quality, as defined by NSA/DHS for cyber security professionals.

    MORE INFORMATION ABOUT NATIONAL SECURITY AGENCY

    You Might Like This Program If...

    • You want to protect digital information, data stores, and computer networks from threats.
    • You want to learn the cyberdefense strategies used to anticipate, recognize, and defend against computer attacks.
    • You're passionate about how we can keep sensitive information out of the hands of hackers, cybercriminals, and terrorist organizations.

    MORE INFORMATION ABOUT WHY STUDENTS CHOOSE TO STUDY NATIONAL SECURITY AGENCY

    The NSA certificate indicates students have completed the courses representing the required knowledge units as specified by the National Security Agency and the Department of Homeland Security as part of Penn State's designation as a National Center of Academic Excellence in Cyber Defense.

    • Knowledge/Application: Explain and apply the interdisciplinary knowledge of information sciences in a security context to recognize, analyze, defend against, and manage cyber risks.
      • Given a specific scenario, students will be able to identify the needed design principle.
      • Students will be able to describe how crypto can be used, strengths and weaknesses, modes, and issues that have to be addressed in an implementation (e.g., key management), etc.
      • Students will be able to describe the differences between symmetric and asymmetric algorithms.
      • Students will be able to describe which cryptographic protocols, tools and techniques are appropriate for a given situation.
      • Students will be able to examine the architecture of a typical, complex system and identify significant - vulnerabilities, -risks,- and points at which specific security technologies/methods should be employed.
      • Students will be able to identify the elements of a cryptographic system.
      • Students will be able to apply security principles to the design and development of database systems and database structures.
      • Students will be able to identify and describe common security concerns in database management systems.
      • Describe a basic network architecture given a specific need and set of hosts/clients.
      • Students will be able to apply their knowledge of network technologies to design and construct a working network.
      • Students will be able to demonstrate the use of a network monitor to display packets.
      • Students will be able to analyze a trace of packets to identify the establishment of a TCP connection.
      • Students will be able to track and identify the packets involved in a simple TCP connection (or a trace of such a connection).
      • Students will be able to describe the fundamental concepts, technologies, components and issues related to communications and data networks.
      • Students will be able to describe the hardware components of modern computing environments and their individual functions.
      • Students will be able to describe the fundamental concepts, technologies, components and issues related to communications and data networks.
      • Students will be able to use a network mapping tool (e.g., Nmap).
      • Students will be able to apply their knowledge to implement network defense measures.
      • Demonstrate their proficiency in the use of scripting languages to write simple scripts (e.g., to automate system administration tasks).
      • Students will be able to use a network monitoring tools (e.g., WireShark).
      • Students will be able to describe the various concepts in network defense.
      • Students will be able to apply cyber defense methods to prepare a system to repel attacks.
      • Students will be able to describe appropriate measures to be taken should a system compromise occur.
      • Students will be able to describe common security models of database management systems.
      • Students will be able to compare the advantages and disadvantages of various risk assessment methodologies.
      • Students will be able to describe how risk relates to a system security policy.
      • Describe various risk analysis methodologies.
      • Students will be able to select the optimal methodology based on needs, advantages and disadvantages.
    • Problem-Solving: Understand, apply and adapt various problem solving strategies, using appropriate technology and methods.
      • Students will be able to demonstrate proficiency in the use of a programming language to solve complex problems in a secure and robust manner.
      • Students will be able to demonstrate the ability to design and develop basic programs for modern computing platforms (e.g., PC, cloud, mobile, web).
      • Students will be able to write simple linear and looping scripts.
      • Students will be able to write simple and compound conditions within a programming language or similar environment (e.g., scripts, macros, SQL).
      • Students will be able to describe how basic statistics and statistical methods can be applied in a given situation.
      • Students will be able to evaluate probabilities to solve applied problems. (STAT 200, SRA 365)
      • Students will be able to apply standard statistical inference procedures to draw conclusions from data.
      • Students shall be able to use one or more common DF tools, such as EnCase, FTK, ProDiscover, Xways, SleuthKit.
      • Students will be able to identify the bad actors in cyberspace and compare and contrast their resources, capabilities/techniques, motivations, aversion to risk.
      • Students will be able to examine the placement of security functions in a system and describe the strengths and weaknesses.
    • Communication (Individual and Team): Communicate and work effectively (both individually and in teams) with a range of perspectives and audiences through a variety of media.
    • Students will be able to develop system specific plans for:
      • The protection of intellectual property; - The implementation of access controls; and
      • Patch and change management.
    • Students will be able to develop contingency plans for various size organizations to include: business continuity, disaster recovery and incident response.
    • Professional Responsibilities: Describe professional responsibilities in terms of the ethical, legal and security policy aspects of information assurance and security.
      • Students shall be able to discuss the rules, laws, policies, and procedures that affect digital forensics.
      • Students will be able to describe the steps in performing digital forensics from the initial recognition of an incident through the steps of evidence gathering, preservation and analysis, through the completion of legal proceedings.
      • Students will be able to describe how the type of legal dispute (civil, criminal, private) affects the evidence used to resolve it.
      • Students will be able to list the applicable laws and policies related to cyber defense and describe the major components of each pertaining to the storage and transmission of data.
      • Students will be able to describe how standards, such as the Orange Book, may be applied to the requirements for a sub-contractor or customer.

    Disciplines

    Information Sciences and Technology

    Requirements

    Entry Requirements

    Penn State requires the submission of specific academic credentials to complete your application. Review the secondary and post-secondary requirements for your country below.

    If you are a first year student applying to Penn State:

    Click Apply to start your Penn State application. Before starting, you can also review the Applying Online Worksheet for more details and helpful hints about the application.

    Your application work can be saved at each step of the process by clicking the Save and Continue button at the bottom of the page. This feature will allow you to move back and forth within the application or log off and return to complete your application at a later time.

    After completing your Academic History, you will need to provide your Self-Reported Academic Record (SRAR). As you begin the SRAR process, a new window will open allowing you to complete your SRAR. SRAR will focus on your high school coursework. It is important that this step is a complete and accurate representation of your school record. Therefore, have a copy of your secondary school records available as you complete your SRAR. You will need to enter every class and every grade earned for the last three years, as well as those classes in progress.

    After completing your SRAR, you will be directed back to the Penn State application in order to complete the Program of Study portion of the application. Here, you will indicate your desired starting semester, your intended program of study, and your starting and ending campus. For further details on how to complete this portion based on your applicant type, please see the steps to apply for first-year students.

    After completing this section of the application, you will provide some additional information, an activities resume, and a personal statement. You will be able to paste in this information from other sources, but note that the formatting may not always paste in as intended.

    If you are a transfer student applying to Penn State:

    All international transfer students will be required to submit official high school transcripts in order to complete the application. International transfer students will not complete the Self-Reported Academic Record (SRAR) for either their high school or college coursework.

    If you have accepted your offer of admission to Penn State:

    If you completed SRAR and are accepted to Penn State, please provide the following for grade verification:

    • Official transcript from years 9, 10, 11, and 12. If the transcript is issued in a language other than English, it must be accompanied by a separate line-by-line English translation.
    • Official copy of the Tawjihi, accompanied by a separate line-by-line English translation.

    Career

    Students who earn the Security certificate are prepared to pursue careers in intelligence, risk analysis, defense, and emergency management. Earning the certificate demonstrates that the student completed a program whose curriculum and resources were designated as high quality by the National Security Agency and Department of Homeland Security.

    Because our courses blend technical knowledge with skills in communication and business, a Security certificate allows students to pursue opportunities in intelligence, counterterrorism, computer forensics, and a number of other growing careers.

    MORE INFORMATION ABOUT POTENTIAL CAREER OPTIONS FOR GRADUATES WITH A CERTIFICATE IN NATIONAL SECURITY AGENCY

    Fee Information

    Tuition Fee

    USD 53,135 

    Application Fee

    USD 75 

    How to Apply

    Step 1: Choose Your Application Method

    Apply through MyPennState

    The first step of the application process is to create a Penn State account, if you do not have one already. MyPennState is where future students can access the online application.

    If you are new to MyPennState, you will need to establish a Penn State User ID and password, which you will access during the MyPennState profile creation process. Once you have your log in information, you can sign in to begin work on your application.

    When creating the profile, please use the name that is on your passport. Because materials are filed alphabetically under the family name on the application, it is important that all correspondence and records consistently use the same name (family and given) and spelling. If this name does not match your academic records, please notify us of the difference. Please note: In the U.S., the family name is usually referred to as the last name, and the given name is referred to as the first name.

    Additionally, Penn State requires a current, valid email address, as that is our primary means of communication with international students. To ensure deliverability, please make Penn State (psu.edu) an eligible sender to the account.

    Applying through the Common App

    Applying to Penn State via the Common App is available to first-year (freshman) international students. If applying through the Common App, Penn State will create a MyPennState profile when the application is submitted and you will receive instructions on how to access your profile. If you intend to apply with the Common App, you do not need create a MyPennState profile prior to submitting your application.

    Step 2: Access the Application and Review Important Dates

    While you can create a MyPennState profile at any time, the application for admission becomes available on the following dates:

    Fall/Summer Admission: August 1

    Spring Admission: June 1

    The application submission dates vary by applicant type and intended program of study. Some programs have specific deadlines or admissions requirements. Please refer to our Dates & Deadlines for more information about application deadlines, as well as our Admissions Requirements to review information about any additional materials required for your intended program of study.

    Step 3: Start Your Penn State Application

    If applying through MyPennState:

    Click Apply Online to start your Penn State application. 

    Your application work can be saved at each step of the process by clicking the "Save and Continue" button at the bottom of the page. This feature will allow you to move back and forth within the application or log off and return to complete your application at a later time.

    After completing your Academic History, you will need to provide your Self-Reported Academic Record (SRAR), unless otherwise directed. You will be directed to enter information about your secondary school coursework. Please have a copy of your secondary school records as you complete SRAR. It is important that this step is a complete and accurate representation of your school record. You will need to enter every grade for every course you have taken in the last three years, as well as your current schedule of classes.

    Students educated in South Korea will not complete SRAR. The document requirements for South Korea can be found by reviewing our International Credential Requirements.

    After this section, you will be directed back to the Penn State application to complete the Program of Study portion. Here, you will indicate your desired starting semester, your intended program of study, and your starting and ending campus. For further details on how to complete this portion based on your applicant type, please see the steps to apply for either first-year students or transfer students.

    After this portion, you will provide some additional application information, an activities resume, and a personal statement. You will be able to paste in this information from other sources, but note that the formatting may not always paste in as intended.

    If applying through the Common App:

    Complete the Common App, which will then direct you to MyPennState to complete SRAR. Applicants using the Common App may feel that they provided their high school record via the Common App, but Penn State requires the completion of SRAR via MyPennState. We strongly encourage you to obtain an official copy of your high school transcript to ensure accurate entry of your coursework completed and grades earned. The SRAR will include all of your high school coursework from your last three years of work and your current year schedule. If your final year grades are available when you enter SRAR, you can enter them at that time.

    Step 4: Submit Your Application

    The application requires a nonrefundable application fee of $75 for international students. Be sure to complete the last step after Summary and Review, which finalizes payment of your fee, and be certain it is successfully submitted. Once the application is submitted, you can verify its completion by accessing your MyPennState profile.

    Step 5: Submit Required Application Materials

    In order to complete your Penn State application, we need the following materials:

    • Application
    • Secondary school record
    • Post-secondary school records (if applicable)
    • First-year applicants only: Official test scores: SAT (code #2660) or ACT (code #3656)

      Writing Component and Subject Tests

      Please note: The writing component of standardized tests (SAT or ACT) is not required. The writing component will not be used as part of our evaluation. If your test scores include the writing component, by all means, have those scores sent to Penn State. Additionally, we do not require SAT Subject Tests.

    • English language proficiency, if your native language is not English

    Please see the admissions requirements for international students to review the details about the required application materials. Some programs require additional items to complete your application. Please review our Admissions Requirements for those details.

    Penn State does not require letters of recommendation, nor are they used in a student’s evaluation (unless required for a specific program).

    Step 6: Check Your Application Status in MyPennState

    You can always check the status of your application in MyPennState. We will communicate with you via MyPennState and through a series of emails regarding the missing items for your application. When everything has arrived, you will see a status in MyPennState confirming the completion of your application.

    Please note: It is your responsibility to check on the status of your application and send us any missing materials.

    Step 7: Receive Your Admission Decision

    Once we have reached a decision regarding your application, we will update your status in MyPennState and provide a printable PDF of your decision letter. Review our Dates & Deadlines to see when you should expect your decision.

    If accepted, you can accept your offer of admission in MyPennState to begin the process of becoming a Penn State student. Visit our Accepted Students section to review the next steps in this process. Once you accept your offer of admission to Penn State, those students completing SRAR will submit their official records for validation purposes as soon as possible.

    Pennsylvania State University

    National Security Agency

    Pennsylvania State University

    [object Object]

    United States of America,

    University Park

    Similar Programs

    Other interesting programs for you

    Find More Programs
    Wishlist