Cybersecurity Law, Policy, and Management Graduate Certificate
June 1, 2026
August 25, 2026
Advance your career with Ohio State’s online certificate in cybersecurity law, policy and management.
As digital threats evolve, cybersecurity has emerged as a challenge that involves not just technology, but also law, policy and management. The graduate certificate in Cybersecurity Law, Policy and Management (CLPM) from The Ohio State University equips you with the interdisciplinary knowledge and skills to lead in this critical field.
Designed for working professionals, this 15-credit, fully online graduate certificate can be completed in as little as three semesters or 1 year.
Whether you’re a manager, technologist, attorney or recent graduate, this program prepares you to navigate the complex legal and policy landscape of cybersecurity while implementing effective organizational strategies.
Why choose Ohio State for Cybersecurity Law and Policy?
When you choose Ohio State, you’re joining a university with nationally recognized leaders in both public affairs and law. The online Cybersecurity Law, Policy and Management Graduate Certificate was developed in collaboration with the John Glenn College of Public Affairs and the Moritz College of Law, ranked #16 and #28 respectively by U.S. News & World Report in 2025. This unique program brings together top-tier faculty and interdisciplinary expertise to deliver a program that blends data, software and systems security with relevant legal, policy and management perspectives. As the only online certificate of its kind in Ohio, the CLPM program offers a flexible, fully online format designed for working professionals who want to advance their careers in a growing field.
Frequently Asked Questions
This certificate is designed for professionals like you, who have completed at least a bachelor’s degree and want to deepen their understanding of cybersecurity from legal, policy and management perspectives. This certificate could be a great fit for you if you fall into one of these areas:
- Public, nonprofit or private sector manager responsible for cybersecurity strategy or compliance, looking to strengthen your expertise
- Technologist or IT professional aiming to expand your knowledge of governance, law and policy
- Attorney or legal professional interested in specializing in cybersecurity law and regulation
- Career changer or recent graduate ready to enter the cybersecurity field with a strong, multidisciplinary foundation
No. While the program includes an introductory course in cybersecurity fundamentals, it is designed for professionals from a variety of fields, including law, public policy and management.
This certificate equips you with the knowledge and skills to take on leadership roles in cybersecurity governance, compliance, and strategy. Common job titles include Cybersecurity Policy Analyst, Privacy Compliance Officer, Risk and Governance Manager and Cybersecurity Legal Advisor.
Yes, 100% of credits earned are fully transferrable into the Master of Public Administration (MPA) and Master of Public Administration and Leadership (MPAL). Law course credits are 100% transferable to the Master in the Study of Law degree, along with up to 6 other credits from this certificate.
Related Programs
Accelerate your career with one of our other public affairs programs. All certificate credits transfer into either the Master of Public Administration or the Master of Public Administration and Leadership program. Law course credits in this program are 100% transferable to the Master in the Study of Law degree, along with up to 6 other credits. Whether you’re exploring professional development opportunities or building a strong foundation for a master’s degree, our programs offer in-demand skills in a flexible format.
Related Programs
Accelerate your career with one of our other public affairs programs. All certificate credits transfer into either the Master of Public Administration or the Master of Public Administration and Leadership program. Law course credits in this program are 100% transferable to the Master in the Study of Law degree, along with up to 6 other credits. Whether you’re exploring professional development opportunities or building a strong foundation for a master’s degree, our programs offer in-demand skills in a flexible format.
Master in the Study of Law
Gain a deeper understanding of the legal landscape, critical thinking skills, and professional insight to advance in your current role or explore new career paths.
Public Management Graduate Certificate
Advance public management skills and prepare for leadership roles.
Federal Policy and Management Graduate Certificate
Learn to skillfully navigate the federal policy environment.
Academic Calendar
The Cybersecurity Law, Policy, and Management graduate certificate is offered in spring and autumn terms, with application deadlines in November and June.
Academic Calendar
The Cybersecurity Law, Policy, and Management graduate certificate is offered in spring and autumn terms, with application deadlines in November and June.
Admission Criteria
To qualify for this graduate certificate, you must meet the following requirements:
- Bachelor’s or advanced degree
- Minimum 3.0 GPA highly recommended
For your application, you will be required to submit:
- College transcript(s)*
- If your GPA is below a 3.0, then one letter of recommendation is required for consideration
- Statement of purpose: Include articulation of how this certificate is consistent with your professional goals.
- Resume or CV
- If you graduated from an international undergraduate institution, it is recommended to score at least a 100 in the TOEFL iBT
*To complete your application and verify your GPA, you must submit transcripts from all educational institutions you have attended.
- When applying:
- You may upload scanned copies of official transcripts, diplomas, or degree certificates to the online application system.
- These scans help form a complete application packet, but they do not replace the need for official documents.
- What is not accepted:
- Advising reports
- Unofficial transcripts or scans labeled “UNOFFICIAL”
- Documents with a URL across the top
- Transcripts missing the institution’s name, seal, stamp, or GPA
- These types of documents will not be used for degree verification or GPA calculation.
Exception: You do not need to submit transcripts for coursework or degrees earned from The Ohio State University.

The Ohio State University participates in the State Authorization Reciprocity Agreements (SARA).
SARA is a national initiative that increases student access to distance education courses and programs while maintaining compliance with state regulations. Institutions participating in SARA can offer educational opportunities in all 49 SARA member states, the District of Columbia, the U.S. Virgin Islands and Puerto Rico without seeking individual approval in each state.
California is not a SARA member state, however, OSU may offer online courses and programs to students located in California under the California Private Post-Secondary Act of 2009.
The Application Process
Once you understand your program’s admission criteria, please note the application deadline. You’ll need a quiet space and a variety of materials for your application. To learn more, please see our Admissions page for the full process. Ready to Apply? Find your application here.
Career Outlook
Cybersecurity is one of the fastest-growing sectors in the U.S., with job openings increasing by over 80% since 2010. As threats grow more complex, so does the demand for professionals who understand the intersection of law, policy and technology.
Whether you’re looking to grow in your current career or make a career change altogether, Ohio State’s online programs can help you achieve your goals. Learn what the outlook is for your current or next career move using O*Net’s My Next Move tool.
Top Occupations by Median Income
What They Do
Plan, implement, upgrade, or monitor security measures for the protection of computer networks and information. Assess system vulnerabilities for security risks and propose and implement risk mitigation strategies. May ensure appropriate security controls are in place that will safeguard digital files and vital electronic infrastructure. May respond to computer security breaches and viruses.
Work Activities
Develop plans to safeguard computer files against accidental or unauthorized modification, destruction, or disclosure and to meet emergency data processing needs. Monitor current reports of computer viruses to determine when to update virus protection systems. Encrypt data transmissions and erect firewalls to conceal confidential information as it is being transmitted and to keep out tainted digital transfers.
Wage Range
- Entry Level: $69,660
- Mid Level: $124,910
- Senior Level: $186,420
Job Outlook
Bright
Projected Growth
32.7%
Related Careers
- Computer Systems Analysts
- Digital Forensics Analysts
- Information Security Engineers
- Network and Computer Systems Administrators
- Penetration Testers
Job Sectors
- Computers and Electronics
- English Language
- Administration and Management
- Engineering and Technology
- Telecommunications
What They Do
Develop and oversee the implementation of information security procedures and policies. Build, maintain and upgrade security technology, such as firewalls, for the safe use of computer networks and the transmission and retrieval of information. Design and implement appropriate security controls to identify vulnerabilities and protect digital files and electronic infrastructures. Monitor and respond to computer security breaches, viruses, and intrusions, and perform forensic investigation. May oversee the assessment of information security systems.
Work Activities
Assess the quality of security controls, using performance indicators. Conduct investigations of information security breaches to identify vulnerabilities and evaluate the damage. Coordinate documentation of computer security or emergency measure policies, procedures, or tests.
Wage Range
- Entry Level: $52,650
- Mid Level: $108,970
- Senior Level: $176,800
Job Outlook
Bright
Projected Growth
10.8%
Related Careers
- Computer Network Support Specialists
- Computer Systems Analysts
- Information Security Analysts
- Network and Computer Systems Administrators
- Penetration Testers
What They Do
Plan, initiate, and manage information technology (IT) projects. Lead and guide the work of technical staff. Serve as liaison between business and technical aspects of projects. Plan project stages and assess business implications for each stage. Monitor progress to assure deadlines, standards, and cost targets are met.
Work Activities
Manage project execution to ensure adherence to budget, schedule, and scope. Confer with project personnel to identify and resolve problems. Monitor or track project milestones and deliverables.
Wage Range
- Entry Level: $52,650
- Mid Level: $108,970
- Senior Level: $176,800
Job Outlook
Bright
Projected Growth
10.8%
Related Careers
- Computer and Information Systems Managers
- Computer Systems Analysts
- Management Analysts
- Project Management Specialists
- Software Developers
Job Sectors
- English Language
- Customer and Personal Service
- Computers and Electronics
- Administration and Management
- Engineering and Technology
What They Do
Plan, direct, or coordinate activities in such fields as electronic data processing, information systems, systems analysis, and computer programming.
Work Activities
Direct daily operations of department, analyzing workflow, establishing priorities, developing standards and setting deadlines. Meet with department heads, managers, supervisors, vendors, and others, to solicit cooperation and resolve problems. Review project plans to plan and coordinate project activity.
Wage Range
- Entry Level: $104,450
- Mid Level: $171,200
- Senior Level:
Job Outlook
Bright
Projected Growth
17.4%
Related Careers
- Computer Systems Analysts
- Computer Systems Engineers/Architects
- Information Security Engineers
- Project Management Specialists
- Software Developers
Job Sectors
- Computers and Electronics
- Customer and Personal Service
- Administration and Management
- Engineering and Technology
- English Language
What They Do
Represent clients in criminal and civil litigation and other legal proceedings, draw up legal documents, or manage or advise clients on legal transactions. May specialize in a single area or may practice broadly in many areas of law.
Work Activities
Interpret laws, rulings and regulations for individuals and businesses. Analyze the probable outcomes of cases, using knowledge of legal precedents. Gather evidence to formulate defense or to initiate legal actions by such means as interviewing clients and witnesses to ascertain the facts of a case.
Wage Range
- Entry Level: $72,780
- Mid Level: $151,160
- Senior Level:
Job Outlook
Average
Projected Growth
5.2%
Related Careers
- Administrative Law Judges, Adjudicators, and Hearing Officers
- Arbitrators, Mediators, and Conciliators
- Claims Adjusters, Examiners, and Investigators
- Judges, Magistrate Judges, and Magistrates
- Judicial Law Clerks
Job Sectors
- Law and Government
- English Language
- Customer and Personal Service
- Administrative
- Computers and Electronics
What They Do
Examine, evaluate, and investigate eligibility for or conformity with laws and regulations governing contract compliance of licenses and permits, and perform other compliance and enforcement inspection and analysis activities not classified elsewhere.
Work Activities
Warn violators of infractions or penalties. Evaluate applications, records, or documents to gather information about eligibility or liability issues. Advise licensees or other individuals or groups concerning licensing, permit, or passport regulations.
Wage Range
- Entry Level: $46,230
- Mid Level: $78,420
- Senior Level: $130,030
Job Outlook
Average
Projected Growth
5.4%
Related Careers
- Claims Adjusters, Examiners, and Investigators
- Compliance Managers
- Eligibility Interviewers, Government Programs
- Environmental Compliance Inspectors
- Government Property Inspectors and Investigators
Job Sectors
- Law and Government
- English Language
- Customer and Personal Service
- Public Safety and Security
- Computers and Electronics
What They Do
Plan, direct, or coordinate activities of an organization to ensure compliance with ethical or regulatory standards.
Work Activities
Report violations of compliance or regulatory standards to duly authorized enforcement agencies as appropriate or required. Identify compliance issues that require follow-up or investigation. Discuss emerging compliance issues to ensure that management and employees are informed about compliance reporting systems, policies, and practices.
Wage Range
- Entry Level: $68,860
- Mid Level: $136,550
- Senior Level: $227,590
Job Outlook
Bright
Projected Growth
5.7%
Related Careers
- Compliance Officers
- Environmental Compliance Inspectors
- Management Analysts
- Regulatory Affairs Managers
- Regulatory Affairs Specialists
Job Sectors
- Law and Government
- English Language
- Administration and Management
- Customer and Personal Service
- Personnel and Human Resources
What They Do
Analyze science, engineering, business, and other data processing problems to develop and implement solutions to complex applications problems, system administration issues, or network concerns. Perform systems management and integration functions, improve existing computer systems, and review computer system capabilities, workflow, and schedule limitations. May analyze or recommend commercially available software.
Work Activities
Troubleshoot program and system malfunctions to restore normal functioning. Provide staff and users with assistance solving computer-related problems, such as malfunctions and program problems. Test, maintain, and monitor computer programs and systems, including coordinating the installation of computer programs and systems.
Wage Range
- Entry Level: $63,160
- Mid Level: $103,790
- Senior Level: $166,030
Job Outlook
Bright
Projected Growth
10.7%
Related Careers
- Computer Systems Engineers/Architects
- Database Administrators
- Database Architects
- Information Security Engineers
- Software Developers
Job Sectors
- Computers and Electronics
- Customer and Personal Service
- English Language
- Mathematics
- Administration and Management
What They Do
Administer, test, and implement computer databases, applying knowledge of database management systems. Coordinate changes to computer databases. Identify, investigate, and resolve database performance issues, database capacity, and database scalability. May plan, coordinate, and implement security measures to safeguard computer databases.
Work Activities
Modify existing databases and database management systems or direct programmers and analysts to make changes. Plan, coordinate, and implement security measures to safeguard information in computer files against accidental or unauthorized damage, modification or disclosure. Plan and install upgrades of database management system software to enhance database performance.
Wage Range
- Entry Level: $56,820
- Mid Level: $104,620
- Senior Level: $160,890
Job Outlook
Bright
Projected Growth
8.2%
Related Careers
- Computer Systems Analysts
- Computer Systems Engineers/Architects
- Database Architects
- Network and Computer Systems Administrators
- Software Developers
Job Sectors
- Computers and Electronics
- English Language
- Customer and Personal Service
- Mathematics
- Telecommunications
What They Do
Design strategies for enterprise databases, data warehouse systems, and multidimensional networks. Set standards for database operations, programming, query processes, and security. Model, design, and construct large relational databases or data warehouses. Create and optimize data models for warehouse infrastructure and workflow. Integrate new systems with existing warehouse structure and refine system performance and functionality.
Work Activities
Develop and document database architectures. Collaborate with system architects, software architects, design analysts, and others to understand business or industry requirements. Develop database architectural strategies at the modeling, design and implementation stages to address business or industry requirements.
Wage Range
- Entry Level: $81,630
- Mid Level: $135,980
- Senior Level: $209,990
Job Outlook
Bright
Projected Growth
10.8%
Related Careers
- Computer Systems Analysts
- Computer Systems Engineers/Architects
- Data Warehousing Specialists
- Database Administrators
- Software Developers
Job Sectors
- Computers and Electronics
- Engineering and Technology
- Design
- Mathematics
- English Language
National occupational information in Ohio State Online’s Career Outlook tool is sourced from O*NET Online and the U.S. Bureau of Labor Statistics (BLS). The median annual wage displayed to the right of each occupational title above is based on the BLS Employment Projections program. Outlook and percent change indicate projected growth or decline over the next 10 years.
National occupational information in Ohio State Online’s Career Outlook tool is sourced from O*NET and the U.S. Bureau of Labor Statistics (BLS). The median annual wage displayed to the right of each occupational title above is based on the BLS Employment Projections program. An up or down arrow indicates projected growth or decline over the next 10 years.
Curriculum
In this program, you will start with an Introduction to Cybersecurity course offered by the College of Engineering followed by four more courses. Three of those courses must be core courses. One of these courses can be an elective of your choice to substitute for a core course. Glenn College courses will be taught online asynchronously. Moritz College courses will be taught online asynchronously (with a live first meeting).
This course will provide you with an introduction to cybersecurity. Learn technical fundamentals of data, software, component, network and system security. Explore cybersecurity from an organizational and societal viewpoint, including human factors.
Learn how to design and manage a robust cybersecurity architecture using law, policy, and management.
Learn the concepts and skills to manage cybersecurity from a data governance perspective.
Confront the cutting-edge legal issues that arise from technological change and the Internet.
Examine the legal, policy, and operational management issues related to data privacy and data protection.
Electives
You have the option of taking one elective course in lieu of one core course above. Introduction to Cybersecurity is required.
Negotiation skills have been identified as critical for effective, successful public management and leadership. This course explores the major concepts and theories of negotiation to improve negotiation skills. Through readings, role play exercises and class discussion, students develop an understanding of individual negotiation styles, core approaches to negotiation and dispute resolution, how to negotiate with multiple parties and to increase confidence in individual negotiation skills.
This course provides opportunities for managers to identify common biases and logical fallacies in decision-making and employ skills and techniques to compensate for them.
This course is an introduction to international standards and methods for project management (PM); the application of tools, the basic, ancillary, and “soft” skills for successful PM; public sector challenges; and strengths/limitations in a complex organic environment.
This advanced survey course provides students with theoretical knowledge and practical tools needed to manage nonprofit organizations. After an overview of the nonprofit sector, we will explore various aspects of nonprofit management such as organizational creation, strategic planning, performance evaluation, board governance, executive leadership, human resources, finance, marketing, advocacy, and collaboration. This course uses multiple learning methods such as case studies, presentations, and discussions to better understand options for addressing managerial challenges experienced by nonprofits.
Provides a unique opportunity to explore U.S. federal policy and administration in the nation’s capital. Students will be exposed to a range of issues that are among the most salient to understanding the complexities of the federal government. Students will apply knowledge, utilize analytical tools, and research various subjects relating to the federal policy and administration.
This course provides an introduction to public management, with a focus on the environment, structure and design of the organizations that public managers run. We will build from a foundation in organizational theory and consider management challenges facing organizations that carry out public purposes. We will focus on traditional public sector organizations, government funded bureaus and agencies that deliver public services directly to citizens but will also consider other organizations that operate in the public sector (e.g. nonprofits, private firms under contract). Taken together, our examination of the environment and structure of public organizations will help you diagnose the management challenges and opportunities in managing a public sector organization.
This course provides a comprehensive assessment of theories and tools for decision-making in the face of risk and uncertainty, giving a rigorous treatment of current issues and approaches in risk analysis through both qualitative and quantitative lenses.
Understanding Online Course Types
As you research the right online program for you, you likely will come across the terms “asynchronous” and “synchronous.” Learn what these terms mean and how they’re important to consider when understanding how a program will fit into your life.
Learn More
Program Faculty
As an online student in the Cybersecurity Law, Policy and Management Graduate Certificate you will benefit from some of the top experts in the fields of computer engineering, policy and law.
Featured Faculty
David Landsbergen
Associate Professor
Dr. David Landsbergen will help you understand how law, technology and policy come together to improve how the government uses information to make decisions. Whether you’re focused on cybersecurity, digital transformation, or public innovation, Dr. Landsbergen brings real-world experience and a passion for helping you apply what you learn to make a meaningful impact.
Faculty
Dr. Megan LePere-Schloop
Assistant Professor
Amanda Girth
Associate Professor
Todd Suddeth
Senior LecturerProgram Instructor, Moritz College of Law
Featured Faculty
Marcel Duhamel
Lecturer
Marcel Duhamel brings over 30 years of real-world legal experience into the classroom, offering you a unique perspective on complex litigation, privacy law and consumer protection. His deep knowledge of banking, bankruptcy and data privacy law, combined with his hands-on experience in both trial and appellate courts, will provide you with practical insights and a strong foundation in legal reasoning, advocacy and professional ethics.
Program Faculty, Moritz College of Law
Featured Faculty
Kirk Herath
Adjunct Professor
Kirk Herat is Ohio’s Cybersecurity Strategic Advisor to Governor Mike DeWine and Chair of CyberOhio. With over 30 years of experience at Nationwide as VP, Associate General Counsel, and Chief Privacy Officer, Kirk brings real-world expertise to the classroom. With degrees in political science, history, international affairs, and law, plus certifications in privacy, Kirk is here to help you connect your education to the evolving world of cybersecurity and data governance.
Testimonials
See what our students and alumni have to say about their experience at The Ohio State University.
“Ohio State is a large institution with a lot of possibilities and opportunities. You will meet people who you can connect with and who will connect you with others.”
“Being able to apply everything I was working on for school immediately to my work was my favorite part of the program.”
“I could not have faced so many obstacles without the support, strength and guidance from the faculty and staff. Even when times were tough, they believed in me, so I believed in me.”
“Ohio State is a large institution with a lot of possibilities and opportunities. You will meet people who you can connect with and who will connect you with others.”
“Being able to apply everything I was working on for school immediately to my work was my favorite part of the program.”
“I could not have faced so many obstacles without the support, strength and guidance from the faculty and staff. Even when times were tough, they believed in me, so I believed in me.”
Tuition fees are subject to change. The table above serves as a guide and not an official bursar’s bill. Full-Time costs are total tuition costs per semester.
Financial Aid Resource
Financial Aid Resource
Related Articles
Related Articles
How to ask your employer for tuition reimbursement
How to Pay for Your Online Program
Tips for Online Learning from Ohio State Students and Faculty
Get Started
Connect with a knowledgeable Enrollment Advisor who can help answer your questions and explain different aspects of the more than 80 online degrees and certificates offered at Ohio State. They are here to help you on your education journey.