Active shooter training at UAlbany’s National Center for Security and Preparedness.

Certificate of Graduate Study

Emergency Preparedness, Homeland Security and Cybersecurity

CEHC students engaged in training
Program of Study

Core Course: Intelligence Analysis

Gain knowledge of tradecraft used in modern espionage in this required course taught by a seasoned CIA foreign and domestic intelligence analyst. Apply structured analytic methods to exercises on terrorism and crime, and learn how to use tools developed for the CIA that are now taught throughout the intelligence community, including the FBI.

Additional Information

See the Graduate Bulletin for details.

For more information, contact [email protected].

Program Tracks
Emergency Preparedness

Minimize risk to people, property, small businesses, nonprofits, government agencies, and corporations by evaluating hazards, responding to emergencies and disasters, and coordinating shared community resources and equipment.


Required course: Disaster, Crisis, and Emergency Management, and Policy

Sample electives: Terrorism, Public Security, and Law Enforcement; Preparedness and Response; Data Models and Decisions



Job titles: Disaster Program Manager, Emergency Response Strategist, Catastrophe Risk Analyst

Homeland Security

Secure America's towns, cities, borders, airports, seaports and waterways as a skilled member of law enforcement, immigration and travel security agencies, prevention and response teams, and mission support organizations.


Required course: Political Violence, Insurgency, and Terrorism
Sample electives: Terrorism, Public Security and Law Enforcement, Homeland Security Intelligence, Global Security


Job titles: Terrorist Threat Investigator, Criminal Intelligence Analyst, TSA Field Intelligence Officer


Help companies, government agencies, and nonprofit organizations protect sensitive and proprietary information from data breaches, hackers, inside threats, and natural disasters like fires and floods.


Required course: Principles and Practices of Cybersecurity
Sample electives: Cryptographic Protocols, International Cyber Conflicts, Multimedia Forensics


Job titles: Cyber Exploitation Officer, Forensic Cryptologist, Network Intrusion Detection Specialist

Admissions Requirements

  • Fall: Rolling
  • Spring: Rolling
  • Summer: Rolling

There is no departmental assistantship consideration for this program.

Required Application Materials
  • Transcripts from all schools attended
  • Resume
  • Statement of goals

The statement is generally one to two pages discussing what you have to offer the program and what you wish to get out of the program.  It should include a brief description of the applicant's field of interest, related background, desired area of study and research emphasis or career goals.


*One or two letters of recommendation are encouraged but not required for admission.  Applicants can also supply an optional writing sample but it is not required.