Non-Degree Certificates and Courses
100% Online. Flexible. Accredited
Non-Degree Certificates and Courses
Students looking to improve their professional or personal development without having to fulfill degree requirements are welcome to apply as non-degree students. The Non-Degree Status is designed for scholars from across the world looking to take a specific course or courses from ECCU’s Bachelor’s or Master’s degree programs. A maximum of two courses may be taken in non-degree status.
What Can a Non-Degree Student Do?
Build Your College Credits
All non-degree students can attain course credits that can then be used in a variety of ways, including toward a degree program if you later decide to pursue one. This can be done simply by applying courses taken to the degree requirements for the program you gain admission into.
Learn In-Depth Without the Commitment
The non-degree status is created for students who wish to gain in-depth knowledge on a subject without having to commit to a full-fledged degree.
Attain an Industry-Recognized Certification
Certain non-degree status offerings at ECCU give you the chance to attain a certification along with the course. This gives you the opportunity to gain in-depth knowledge and attain certification to prove your knowledge and skills. Learn more about certifications here
Non-degree courses run for a 12-week term.
The process is very similar to any application for a degree program. Simply fill out the non-degree application form providing all the requested details and pay the application fee of $100.
A complete application will include:
- The completed application
- A scan of your official government ID
- Document showing proof of education/certifications.
Once you complete the online admissions application, ECCU will notify you of your acceptance status within 7 business days.
In order to qualify for a course with non-degree status, applicants must:
- Be 18 years of age or older.
- Have earned and submitted proof of a high school diploma (or equivalent) or college degree (or certification).
- Be sufficiently proficient in English.
Every course is aligned to the Bachelor’s and Master’s degree program. Tuition prices and fees are the same as for the courses when taken within the degree program.
Per Credit Hour
|Total Tuition Fee:
Per Credit Hour
|Total Tuition Fee:
- $50 Technology fee per term enrolled
- $100 Application fee (one-time fee)
- $10 Transcript fee (plus shipping, if international)
Courses of Study
- CIS 300 – Fundamentals of Information Systems Security
- CIS 301 – Legal Issues in Cybersecurity
- CIS 302 – Managing Risk in Information Systems
- CIS 303 – Security Policies and Implementation Issues
- CIS 304 – Auditing IT Infrastructures for Compliance
- CIS 308 – Access Control
- CIS 401 – Security Strategies in Windows Platforms and Applications
- CIS 402 – Security Strategies in Linux Platforms and Applications
- CIS 403 – Network Security, Firewalls, and VPNs
- CIS 404 – Hacker Techniques, Tools, and Incident Handling
- CIS 405 – Internet Security: How to Defend Against Online Attackers
- CIS 406 – System Forensics, Investigation, and Response
- CIS 407 – Cyberwarfare
- CIS 408 – Wireless and Mobile Device Security
- CIS 410 – Capstone Course
- COM 340 – Communication and Technical Writing
- MTH 350 – Introduction to Statistics
- PSY 360 – Social Psychology
- BIS 430 – Ethics for the Business Professional
- ECN 440 – Principles of Microeconomics
- MGT 450 – Introduction to Project Management
- ECCU 505 – Intro to Research and Writing for the IT Practitioner
- MGMT 502 – Business Essentials
- ECCU 504 – Foundations of Organizational Behavior
- ECCU 516 – Hacker Mind: Profiling the IT Criminal
- ECCU 514 – Quantum Leadership
- ECCU 500 – Managing Secure Network Systems
- ECCU 507 – Linux Networking and Security
- ECCU 501 – Ethical Hacking and Countermeasures
- ECCU 503 – Security Analysis and Vulnerability Assessment
- ECCU 506 – Conducting Penetration and Security Tests
- ECCU 509 – Securing Wireless Networks
- ECCU 520 – Advanced Network Defense
- ECCU 518 – Designing and Implementing Cloud Security
- ECCU 510 -Secure Programming
- ECCU 502 – Investigating Network Intrusions and Computer Forensics
- ECCU 521 – Advanced Mobile Forensics and Security
- ECCU 517 -Cyber Law
- ECCU 522 – Incident Handling and Response
- ECCU 513 – Disaster Recovery
- ECCU 512 – Beyond Business Continuity: Managing Organizational Change
- ECCU 511 – Global Business Leadership
- ECCU 523 – Executive Governance and Management
- ECCU 515 – Project Management in IT Security
Change to Degree-Seeking Status
Non-degree students looking to convert from a non-degree to degree status must apply for admission to their degree program of choice. If a non-degree student applies for and is granted admission to a degree program at ECCU, courses taken in non-degree status can be applied to the degree program. In addition, a maximum of 18 graduate credit hours of transfer credit in the graduate program and 90 credits of transfer credit in the Bachelor’s program can be utilized from other institutions of higher education.
To be eligible to apply for the non-degree status, the candidate must be 18 years of age or older and must have a high school diploma (or equivalent) or college degree (or certification).
Courses and Certification Comparison
Certain courses are directly mapped to industry-recognized certifications. Upon completion of a qualifying course, the student will be granted one exam voucher to attempt and earn the certification.
Bachelor’s Degree Courses
Master’s Degree Courses
Network Security, Firewalls, and VPNs
Managing Secure Network Systems
Hacker Techniques, Tools, and Incident Handling
Ethical Hacking & Countermeasures
System Forensics, Investigation, and Response
Investigating Network Intrusions and Computer Forensics
Security Analysis and Vulnerability Assessment
Conducting Penetration and Security Tests
Incident Handling and Response
Executive Governance and Management
Executive Governance and Management
Ans. EC-Council University’s non-degree courses have been designed to focus on a specific course or courses from bachelor’s or master’s degree programs. Students can choose a maximum of two courses at a time in non-degree status.
Ans. EC-Council University’s non-degree students can use their earned credits towards a degree program. This will help them save both money and time. Non-degree programs can help students gain in-depth knowledge on a subject without long-term commitments.
Ans. Students who opt for a non-degree program at a university are those who enroll for certificate courses but are not officially registered in a full-fledged degree program. Upon completing the selected non-degree course, students can then transfer their earned credit and apply to a degree program.
BSCS Course Description
CIS 300 Fundamentals of Information Systems Security
Fundamentals of Information Systems Security provides a comprehensive overview of the essential concepts readers must know as they pursue careers in information systems security. It opens with a discussion of the new risks, threats, and vulnerabilities associated with the transformation to a digital world, including a look at how business, government, and individuals operate today. Part Two is adapted for the official (ISC)2 SSCP Certified Body of Knowledge and presents a high-level overview of each of the seven domains within the System Security Certified Practitioner certification. The text closes with a resource for readers who desire additional material on cybersecurity standards, education, professional certifications, and compliance laws.
CIS 301 Legal Issues in Cybersecurity
Legal Issues in Cybersecurity addresses the area where law and cybersecurity concerns intersect. Information systems security and legal compliance are now required to protect critical governmental and corporate infrastructure, intellectual property created by individuals and organizations alike, and information that individuals believe should be protected from unreasonable intrusion. Organizations must build numerous cybersecurity and privacy responses into their daily operations to protect the business itself, fully meet legal requirements, and to meet the expectations of employees and customers.
CIS 302 Managing Risk in Information Systems
Managing Risk in Information Systems provides a comprehensive overview of the SSCP® Risk, Response, and Recovery Domain in addition to providing a thorough overview of risk management and its implications on IT infrastructures and compliance. Written by industry experts, and using a wealth of examples and exercises, this book incorporates hands-on activities to walk the reader through the fundamentals of risk management, strategies and approaches for mitigating risk, and the anatomy of how to create a plan that reduces risk.
CIS 303 Security Policies and Implementation Issues
Security Policies and Implementation Issues offers a comprehensive, end-to-end view of information security policies and frameworks from the raw organizational mechanics of building to the psychology of implementation. Written by an industry expert, it presents an effective balance between technical knowledge and soft skills and introduces many different concepts of information security in clear, simple terms such as governance, regulator mandates, business drivers, legal considerations, and much more. With step-by-step examples and real-world exercises, this book is a must-have resource for students, security officers, auditors, and risk leaders looking to fully understand the process of implementing successful sets of security policies and frameworks.
CIS 304 Auditing IT Infrastructures for Compliance
Auditing IT Infrastructures for Compliance provides a unique, in-depth look at recent U.S.-based Information systems and IT infrastructure compliance laws in both the public and private sectors. Written by industry experts, this book provides a comprehensive explanation of how to audit IT infrastructures for compliance based on the most recent laws and the need to protect and secure business and consumer privacy data. Using examples and exercises, this Second Edition incorporates numerous hands-on activities to prepare readers to complete IT compliance auditing skillfully.
CIS 308 Access Control
Access control protects resources against unauthorized viewing, tampering, or destruction. They serve as a primary means of ensuring privacy, confidentiality, and prevention of unauthorized disclosure. Revised and updated with the latest data from this fast-paced field, Access Control, Authentication, and Public Key Infrastructure defines the components of access control, provides a business framework for implementation, and discusses legal requirements that impact access control programs. It looks at the risks, threats, and vulnerabilities prevalent in information systems and IT infrastructures and how to handle them. It provides a student and professional resource that details how to put access control systems to work, as well as testing and managing them.
CIS 401 Security Strategies in Windows Platforms and Applications
Security Strategies in Windows Platforms and Applications focuses on new risks, threats, and vulnerabilities associated with the Microsoft Windows operating system. Most individuals, students, educators, businesses, organizations, and governments use Microsoft Windows, which has experienced frequent attacks against its well-publicized vulnerabilities. Emphasis is placed on Windows XP, Vista, and 7 on the desktop, and Windows Server 2003 and 2008 versions. It highlights how to use tools and techniques to decrease risks arising from vulnerabilities in the Microsoft Windows operating systems and applications. The book also includes a resource for readers desiring more information on Microsoft Windows OS hardening, application security, and incident management. With its accessible writing style and step-by-step examples, this must-have resource will ensure readers are educated on the latest Windows security.
CIS 402 Security Strategies in Linux Platforms and Applications
Security Strategies in Linux Platforms and Applications covers every major aspect of security on a Linux system. Written by an industry expert, this book is divided into three natural parts to illustrate key concepts in the field. It opens with a discussion of the risks, threats, and vulnerabilities associated with Linux as an operating system using current examples and cases. Part 2 discusses how to take advantage of the layers of security available to Linux–user and group options, file systems, and security options for important services, as well as the security modules associated with AppArmor and SELinux. The book closes with a look at the use of both open-source and proprietary tools when building a layered security strategy for Linux operating system environments. Using real-world examples and exercises, this useful resource incorporates hands-on activities to walk readers through the fundamentals of security strategies related to the Linux system.
CIS 403 Network Security, Firewalls, and VPNs
Network Security, Firewalls, and VPNs provide a unique, in-depth look at the major business challenges and threats that are introduced when an organization’s network is connected to the public Internet. Written by an industry expert, this book provides a comprehensive explanation of network security basics, including how hackers access online networks and the use of Firewalls and VPNs to provide security countermeasures. Using examples and exercises from the field, this book incorporates hands-on activities to prepare the reader to disarm threats and prepare for emerging technologies and future attacks.
CIS 404 Hacker Techniques, Tools, and Incident Handling
Hacker Techniques, Tools, and Incident Handling begins with an examination of the landscape, key terms, and concepts that a security professional needs to know about hackers and computer criminals who break into networks, steal information, and corrupt data. It goes on to review the technical overview of hacking: how attacks target networks and the methodology they follow. The final section studies the most-effective methods when dealing with hacking attacks, especially in an age of increased reliance on the Web. Written by a subject matter expert with numerous real-world examples, the Second Edition provides readers with a clear, comprehensive introduction to the many threats in our Internet environment and security and what can be done to combat them.
CIS 405 Internet Security: How to Defend Against Online Attackers
Internet Security: How to Defend Against Attackers on the Web provides an in-depth look at how to secure mobile users as customer-facing information migrates from mainframe computers and application servers to Web-enabled applications. Written by an industry expert, the book explores the evolutionary changes that have occurred in data processing and computing, personal and business communications, and social interactions and networking on the Internet. It goes on to review all the risks, threats, and vulnerabilities associated with Web-enabled applications accessible via the Internet. Using examples and exercises, the Second Edition incorporates hands-on activities to prepare readers to secure Web-enabled applications successfully.
CIS 406 System Forensics, Investigation, and Response
System Forensics, Investigation, and Response begins by examining the fundamentals of system forensics, such as what forensics is, the role of computer forensics specialists, computer forensic evidence, and application of forensic analysis skills. Computer crimes call for forensics specialists, people who know how to find and follow the evidence. It also gives an overview of computer crimes, forensic methods, and laboratories. It then addresses the tools, techniques, and methods used to perform computer forensics and investigation. Finally, it explores emerging technologies, as well as future directions, of this interesting and cutting-edge field.
CIS 407 Cyberwarfare
Cyberwarfare puts students on the real-world battlefield of cyberspace! Students will learn the history of cyber warfare, techniques used in both offensive and defensive information warfare, and how cyberwarfare is shaping military doctrine. Written by subject matter experts, this book combines accessible explanations with realistic experiences and case studies that make cyberwar understandable.
CIS 408 Wireless and Mobile Device Security
Wireless and Mobile Device Security explores the evolution of wired networks to wireless networking and its impact on the corporate world. The world of wireless and mobile devices is evolving day to day, with many individuals relying solely on their wireless devices in the workplace and in the home. The growing use of mobile devices demands that organizations become more educated in securing this growing technology and determining how best to protect their assets. Using case studies and real-world events, it goes on to discuss risk assessments, threats, and vulnerabilities of wireless networks, as well as the security measures that should be put in place to mitigate breaches. The text closes with a look at the policies and procedures in place and a glimpse ahead at the future of wireless and mobile device security.
CIS 410 Capstone Course
This course serves as a comprehensive assessment of knowledge and skills in information systems and cybersecurity. Activities include research into selected security problems and planning, designing, and implementing security solutions for a user organization.
COM 340 Communication and Technical Writing
This course is designed to prepare you in the basics of research and writing. You will begin with learning the fundamentals of writing: how to tell if a website is credible/trustworthy, tips and strategies, critiquing, preparing for a research paper, designing an outline, developing a thesis statement, writing a conclusion, and referencing your work. What you learn in this course will help you succeed in your courses to follow, including your final capstone project.
MTH 350 Introduction to Statistics
Introductory Statistics will familiarize students with a broad base of concepts in probability and statistical methods. Students will learn how to collect, analyze, and interpret numerical data and descriptive statistics, create basic probability models, and use statistical inference. This course stresses a wide variety of relevant applications, and students will understand how to interpret and critically analyze research data and apply statistical reasoning and interpretation.
PSY 360 Social Psychology
Why do individuals behave in a certain manner? How do relationships, people, and society influence such behaviors? The purpose of this course is to introduce you to the field of social psychology, but more specifically, understand how others influence our behaviors. This course will provide a general overview of human behavior in a social matrix. The course will explore topics and concepts such as social psychology research, the self, prejudice and discrimination, attraction, relationships, aggression, socialization, and conformity.
BIS 430 Ethics for the Business Professional
What is the right thing to do? What is the ETHICAL thing to do? This course will introduce the principles of ethics (moral philosophy) through a variety of topics and dilemmas. We will examine the ideas of goodness, badness, wrongness, and rightness. We will learn about ethical theories and apply the knowledge to current events to better understand morality, obligation, human rights, and human nature.
ECN 440 Principles of Microeconomics (3 Credits)
Economics is the study of how a society manages its resources. In most societies, resources are allocated through the combined choices of their individual members. Economists study how people make the decisions, how they work, what they buy, how much they save, and how they invest those savings. Economists also study how people interact with one another. Finally, economists analyze forces and trends that affect the economy as a whole, including the growth of income, the fraction of the population that cannot work, and the rate at which prices rise or fall. This course covers these concepts and more.
MGT 450 Introduction to Project Management (3 Credits)
Gaining a strong understanding of IT project management as you learn to apply today’s most-effective project management tools and techniques are skill sets covered in this class. The course emphasizes the latest developments and skills to help you prepare for the Project Management Professional (PMP) or Certified Associate in Project Management (CAPM) exams. While the PMBOK® Guide discusses some of these elements, the course goes well beyond the Guide to provide a meaningful context for project management.
MSCS Course Description
ECCU 505 Introduction to Research and Writing for the IT Practitioner
This foundational core course introduces students to basic English writing skills and research methods, including APA style writing, citing sources, determining when a website is credible, effective communication, outlines, and collaboration. Students will write/present portions of the above in the course in various formats.
MGMT 502 Business Essentials
This course will lay a broad foundation of understanding the processes of global business principles for a varied population of students who work in businesses of all kinds, including the IT and IA fields. It covers the latest changes in Information Technology for business, including computer-aided manufacturing (CAM), application software, and recent ethical issues arising from IT. Real-life business examples are added throughout the course that reinforce the business principles.
ECCU 504 Foundations of Organizational Behavior for the IT Practitioner
This foundation course deals with organizational behavior and allows the technology practitioner to experience the basic facets of organizational theory and define the skills required to understand and apply the theory to a real organizational setting. Elements of the course are organizational structure, effective communication, team building, ethics, and project management, as seen through the organizational lens.
ECCU 516 The Hacker Mind: Profiling the IT Criminal
Cyberspace has increased human communication, connectivity, creativity, capacity, and crime by leaps and bounds in the last decade. For all the positive aspects it offers, it offers as many negative aspects. Those negative aspects are explored and developed by everyone from the high school challenge hacker to an international terrorist. Businesses, governmental agencies, militaries, and organizations of every kind are threatened by the IT criminal. This course will survey the spectrum of psychological attributes that may make up the profile of the IT criminal.
ECCU 514 Quantum Leadership
This course encompasses an extensive research project about cross-cultural differences in leadership conducted by a group of researchers in 62 countries. It lays a foundation for understanding the process of leadership. The study describes the roles, functions, and impact of global leadership concepts. The speed at which leadership must work is provided by many team exercises. Research and views into how most cultures respond to this area of management are provided.
ECCU 500 Managing Secure Network Systems
This course focuses on evaluating network and Internet security issues, designing and implementing successful security policies and firewall strategies, and exposing the system and network vulnerabilities and defending against them. Topics include network protocols, network attacks, intrusion detection systems, packet filtering and proxy servers, Bastion hosts and honey pots, hardening routers, hardening security, email security, virtual private networks, and creating fault tolerance.
ECCU 507 Linux Networking and Security
This course focuses on configuring a secure Linux network using the command line and graphical utilities. Emphasis is placed on file-sharing technologies such as the Network File System, NetWare’s NCP file sharing, and File Transfer Protocol. Additional topics include making data secure, user security, file security, and network intrusion detection. Students will be required to take on the role of problem solvers and apply the concepts presented to situations that might occur in a work environment.
ECCU 501 Ethical Hacking & Countermeasures
This course focuses on how perimeter defenses work, how intruders escalate privileges, and methods of securing systems. Additional topics include intrusion detection, policy creation, social engineering, DoS attacks, buffer overflows, and virus creation.
ECCU 503 Security Analysis and Vulnerability Assessment
This course focuses on testing methods and techniques to effectively identify and mitigate risks to the security of a company’s infrastructure. Topics include penetration testing methodologies, test planning and scheduling, information gathering, password-cracking penetration testing and security analysis, social-engineering penetration testing and security analysis, internal and external penetration testing and security analysis, router penetration testing, security analysis, and reporting and documentation.
ECCU 506 Conducting Penetration and Security Tests
This course focuses on the mastery of the international standard for penetration testing. Topics include customers and legal agreements, penetration testing planning and scheduling, information gathering, external and internal network penetration testing, router penetration testing, firewalls penetration testing, intrusion detection system penetration testing, wireless networks penetration testing, password-cracking penetration testing, social-engineering penetration testing, PDA and cell phone penetration testing, and penetration testing report and documentation writing.
ECCU 509 Securing Wireless Networks
This course focuses on the various methods of securing wireless networks, including authentication, authorization, and encryption. Topics include radio frequency communications, infrared, Bluetooth, low-speed wireless local area networks, high-speed WLANs and WLAN security, digital cellular telephone, fixed wireless, and wireless communications in business.
ECCU 520: Advanced Network Defense
This course focuses on the fundamental areas of fortifying your defenses by discovering methods of developing a secure baseline and how to harden your enterprise architecture from the most advanced attacks. It provides segmentation and isolation to reduce the effectiveness of advanced persistent threats.
ECCU 518: Designing and Implementing Cloud Security
This course provides comprehensive knowledge of cloud services, their characteristics, benefits, applications, and service models. It covers planning, designing, and implementing cloud security controls. It delves into various cloud standards, countermeasures, and best practices to secure information in the cloud. The program also emphasizes the business aspects of cloud security, such as cloud uptime, uptime guarantee, availability, fault tolerance, failover policy, and how cloud security strengthens the business case for cloud adoption.
ECCU 510 Secure Programming
This course provides the essential and fundamental skills for secure programming. The most prevalent reason behind buggy code and vulnerabilities being exploited by hackers and malicious code is the lack of adoption of secure coding practices. This program will ensure that students are exposed to the inherent security drawbacks in various programming languages or architectures. They will be exposed to exercise secure programming practices to overcome these inherent drawbacks to pre-empt bugs from the code.
ECCU 502 Investigating Network Intrusions and Computer Forensics
This course focuses on cyber-attack prevention, planning, detection, and incident response with the goals of counteracting cybercrime, cyber terrorism, and cyber predators and making them accountable. Additional topics include fundamentals of computer forensics, forensic duplication and analysis, network surveillance, intrusion detection and response, incident response, anonymity, computer security policies and guidelines, and case studies.
ECCU 521: Advanced Mobile Forensics and Security
This course focuses on the intricacies of manual acquisition (physical vs. logical) and advanced analysis using reverse engineering to understand how popular Mobile OSs are hardened to defend against common attacks and exploits. Topics include mobile forensic challenges and processes, mobile hardware design and architectures, OS architecture, boot process, and file systems, threats and security, evidence acquisition and analysis, application reverse engineering, and mobile forensics reporting and expert testimony.
ECCU 517 Cyber Law
This course focuses on the legal issues affected by online criminal conduct and electronic evidence and the legal ramifications of neglecting trademarks, copyrights, patents, and digital rights. Topics include laws, regulations, and international standards; privacy laws governing law enforcement investigations in cyberspace; implications of cybercrimes upon the traditional notions of sovereignty; and current events that affect cyber laws. Prerequisite ECCU 505.
ECCU 522: Incident Handling and Response
This course addresses various underlying principles and techniques for detecting and responding to current and emerging computer security threats. Additional emphasis is placed on computer forensics and its role in handling and responding to incidents. Through this course, students will be proficient in handling and responding to various security incidents such as network security incidents, malicious code incidents, insider attack threats, incident response teams, incident management training methods, and incident recovery techniques in detail.
ECCU 513 Disaster Recovery
This course focuses on disaster recovery principles including assessment of risks to an enterprise, development of disaster recovery policies and procedures, the roles and relationships of various members of an organization, preparation of a disaster recovery plan, testing and rehearsal of the plan, implementation of the plan, and recovering from a disaster. Additional emphasis is placed on identifying vulnerabilities and taking appropriate countermeasures to prevent information failure risks.
ECCU 512 Beyond Business Continuity: Managing Organizational Change
Whether an organization has experienced a disaster, downsizing, a shift in culture, or a change in leadership, it will experience organizational change. This change demands remembering the past, finding ways to recover from it, engaging the future, and energizing change. Leaders in change must have the skills to identify, structure, forecast, envision, design, plan, implement, account for, and lead a team through change that has been strategically planned to advance the organization. Such a leader is a change agent and must understand the process, expectations, and nuances of change.
ECCU 511 Global Business Leadership
This course is designed to provide fundamental skills needed to understand global leadership concepts such as developing technological savvy, appreciating diversity, building partnerships, creating a shared vision, maintaining a competitive advantage, integrity, and leading for change. This is a study of current and historical leadership theories with an emphasis on viewing the leadership function in the context of global organizational behavior and organizational designs.
ECCU 523 – Executive Information Security Management/ Executive Governance and Management
This course is designed to bring together all the components required for a C-Level position by combining Governance, Security Risk Management, Controls, Audit Management, Security Program Management and Operations, Information Security Core Concepts, Strategic Planning, Finance, and Vendor Management to lead a highly successful IS program.
ECCU 515 Project Management in IT Security
This class is designed to provide students with knowledge of how to manage IT security projects to enhance the success rate for both organizations and IT managers. It acts as an operational framework for users who design their own IT security project plan. The goal of PMITS is to help the students implement their IT project management skills by providing a roadmap for implementing IT security in their organizations. It standardizes the knowledge base for business professionals by incorporating the best practices and legal standards related to corporate IT security.