|
- Graduate Application
-
As the following micro-credential(s) provide graduate credit upon successful completion, you must submit an application before enrollment. In addition to the application, an official transcript must be sent to cbetranscripts@radford.edu.
-
-
If you earned your bachelor's degree or higher from Radford University, you do not need to request your transcript. Instead, please email your birthdate and full name (as listed at the time of graduation) to cbetranscripts@radford.edu, and we will retrieve your transcript from our records.
-
-
Once your application and transcript have been received and confirmed, you will receive a welcome email with instructions on how to purchase the micro-credential(s) of interest.
-
-
To submit your application, please click ADD TO CART below.
|
|
|
|
- Micro: Foundations of Cybersecurity
-
Fee: $77.20
Credit Hours: 0.20
Professional Dev. Contact Hours: 10
This micro-credential provides a self-directed learning experience for teachers who want to learn about the foundations of cybersecurity. This micro-credential has five modules, and each module offers content aligned to these competencies: identifying the need for cybersecurity professionals, identifying foundational cybersecurity principles, identifying common threats and vulnerabilities related to cybersecurity, identifying tools utilized in cybersecurity practice, and identifying the legal and ethical obligations related to cybersecurity. Using direct instruction via instructor-made videos, guided practice activities, supplementary materials (such as readings and website material), and assessments to check your understanding, this micro-credential offers a learning experience that is based on current educational research and best practices from classrooms.
|
|
|
|
- Micro: Cybersecurity Awareness
-
Fee: $77.20
Credit Hours: 0.20
Professional Dev. Contact Hours: 10
This micro-credential introduces educators to essential cybersecurity awareness concepts through practical, classroom-relevant examples. Participants explore instructional resources, password security best practices, and real-world cybersecurity challenges to build the knowledge needed to promote safe digital behavior. The micro-credential concludes with a summative assessment to demonstrate applied understanding.
|
|
|
|
- Micro: Network and Internet Security
-
Fee: $77.20
Credit Hours: 0.20
Professional Dev. Contact Hours: 10
This micro-credential introduces key strategies used to protect computer networks from cyber threats. Participants examine the foundations of networking, common digital threats, cyber defense mechanisms, and the role of firewalls in securing networked systems.
|
|
|
|
- Micro: Cryptography
-
Fee: $77.20
Credit Hours: 0.20
Professional Dev. Contact Hours: 10
This micro-credential introduces essential cybersecurity concepts related to cryptography, including data security challenges and methods used to address them. Modules focus on defining key cryptographic concepts, explaining cryptography’s role in protecting data privacy and security, and examining how cryptographic methods evolve alongside technological change. Participants are introduced to influential cryptographic algorithms that support modern internet security.
|
|
|
|
- Micro: Digital Forensics
-
Fee: $77.20
Credit Hours: 0.20
Professional Dev. Contact Hours: 10
This micro-credential introduces the field of digital forensics, beginning with an examination of key terms and foundational concepts. Participants learn which types of digital evidence are acceptable in legal proceedings and explore the steps involved in a digital forensic investigation. The micro-credential also addresses different types of digital forensics, including network, memory, and disk forensics. Additionally, participants examine digital artifacts that constitute evidence, techniques for analyzing volatile memory, and tools used for network forensic analysis, such as Wireshark.
|
|
|
|
- Micro: Cyber Ethics, Policies, Laws, and Impacts
-
Fee: $77.20
Credit Hours: 0.20
Professional Dev. Contact Hours: 10
This micro-credential introduces key cybersecurity concepts related to ethics, policies, laws, and societal impacts. Given the complexity of cybersecurity risks and trade-offs, participants explore the relationships among ethical considerations, organizational policies, and legal frameworks that govern cybersecurity practices.
|
|
|
|
- Micro: Host-Based Security
-
Fee: $77.20
Credit Hours: 0.20
Professional Dev. Contact Hours: 10
This micro-credential examines host-based security concepts in educational settings. Participants learn about system security components such as authentication, access control, and auditing, as well as software and operating system hardening techniques. The micro-credential highlights how operating systems manage user access, track activity, and enhance overall system security.
|
|
|
|
- Micro: Security Tools and Scripting
-
Fee: $77.20
Credit Hours: 0.20
Professional Dev. Contact Hours: 10
This micro-credential introduces educators to technical cybersecurity concepts related to system security. It begins with an overview of the Linux operating system and basic command-line usage, then progresses to more advanced commands used for organizing and managing system information.
|
|
|
|
- Micro: Administrative Security
-
Fee: $77.20
Credit Hours: 0.20
Professional Dev. Contact Hours: 10
This micro-credential explores the principles of administrative security. The first module focuses on risk assessment and management, including key terminology and assessment steps. The second module examines organizational policies and procedures used to administer security, supported by real-world examples. The final module addresses business continuity, disaster recovery, and incident response planning, outlining key steps in incident handling.
|
|
|
|
- Micro: Web Exploits and Security
-
Fee: $77.20
Credit Hours: 0.20
Professional Dev. Contact Hours: 10
This micro-credential focuses on web-based vulnerabilities and the tools used to prevent exploitation. Participants examine vulnerable website components, reconnaissance techniques such as search engine hacking and social engineering, and examples of common web exploits. The micro-credential also introduces tools used to test and secure web servers and concludes with a summative assessment.
|
|
|
|