Jan. 28 Transition to Virtual Operations, Campus Closed

Bowie State University will be transitioning to virtual operations for all classes and office operations on Wednesday, January 28, 2026. The campus will be closed to all non-essential personnel, and all campus activities are canceled. All buildings except residence halls will be closed. Essential personnel should report on time. This is due to the extended time required to clear the extensive snow and ice accumulation on campus. University crews are making every effort to resume campus operations, as a safe return to in-person learning and work remains our top priority. Only essential personnel and residential students are permitted access to the campus on Jan. 28. For more information, please visit BowieState.edu/weather.

Upper Division Certificate in Cybersecurity

Your Upper Division Certificate in Cybersecurity from Bowie State University will help you acquire the skills to secure positions in data security, software security, systems security, and societal security. Completing this certification can allow for more career opportunities centered around the creation, operation, analysis, and testing of more secure systems while diversifying academic, military, and law enforcement organizations. You will enter the workforce as an innovative professional who understands the security concerns, legal issues, societal problems, and ethical consequences of cybersecurity.

Explore all the cybersecurity programs at Bowie State > 

 

When you complete your Upper Division Certificate, you will have a well-rounded education that provides insight into the technical and non-technical aspects of cybersecurity. Your certification will also cover software, connection, system, human, organizational, and social security. Once you complete your certification from Bowie State University, you will:  

  • Understand the formal syntax and semantics of programming language.  
  • Recognize the programming tools required to solve advanced problems.  
  • Understand the implementation of basic data structures such as stacks, queues, linked lists, and binary trees. 
  • Discover the challenges and vulnerabilities of securing computer networking systems.  
  • Learn about hacking techniques, tools, and technologies from an offensive perspective.  
  • Understand the legal and ethical aspects of cyber power.