RMU Center for Cyber Research and Training
The RMU Center for Cyber Research and Training offers customized workforce training options and week-long workshops for companies, agencies, and organizations. Our experts teach employees effective strategies to:
- maintain security and deter unauthorized access
- detect cyber intrusions and act quickly to minimize harm
- protect networks, legacy mainframes, and cloud computing
- implement data control policies that still embrace new technology
The Center for Cyber Research and Training also shares best practices and techniques for gathering evidence from mobile devices for law enforcement investigations. Funded by a National Science Foundation grant, RMU has trained more than 50 faculties from other higher education institutions in the last two years in techniques and concepts of mobile forensics and security.
For more information on how the Center for Cyber Research and Training can help prepare your workforce to deal with cyber threats, contact:
- Lawrence Tomei
Director, RMU Center for Cyber Research and Training
RMU offers bachelor's and master's degree programs in cybersecurity both online and on campus. The fully online professional certificate program emphasizes smartphone and other mobile technology.
Certificate in Mobile Forensics and Security
Recover evidence and learn to protect assets in smartphones, flash drives, cell phones, PDAs, GPS devices, and digital cameras.
B.S. in Cyber Forensics and Information Security
Detect and respond to network intrusions and learn best practices to prevent them, while mastering responsible resource use and risk management.
M.S. in Cyber Investigations and Intelligence
Cyber crimes are on the rise, increasing the demand for professionals with both technical and investigative expertise. This degree prepares cyber investigators to work at all levels of government and industry.
M.S. in Cyber Security and Information Assurance
Design and develop systems engineered to be reliable and secure, and to recognize and combat threats and vulnerabilities.