Georgia Tech Professional Education

A Systems Approach - Cybersecurity

Available dates

Feb 4—6, 2020
3 days
Atlanta, Georgia, United States
USD 1695
USD 565 per day
Aug 11—13, 2020
3 days
Atlanta, Georgia, United States
USD 1695
USD 565 per day


Coursalytics is an independent platform to find, compare, and book executive courses. Coursalytics is not endorsed by, sponsored by, or otherwise affiliated with Georgia Tech Professional Education.

Full disclaimer.

About the course

As many business sectors become increasingly information centric and network reliant, cybersecurity is becoming a critical pillar of the enterprise. Cybersecurity: A Systems Approach explores information security vulnerabilities and how to approach cybersecurity resilience as a complex system. Examine effective frameworks for assessing and managing information security within an enterprise architecture, approaching challenges from a top-down systems engineering approach. Practice newly learned techniques through workshop exercises that explore topics such as identifying vulnerabilities, defining threats, assessing risk, and designing a security plan.

What You Will Learn

  • Information security principles
  • Systems engineering approach
  • Vulnerabilities, threats, and exploitations
  • Protections and defenses
  • Cryptography
  • Risk reduction

How You Will Benefit

  • Develop foundational knowledge of the principles of information security and the nature of cyber defense.
  • Understand how systems engineering processes are effectively applied to securing complex, connected systems.
  • Develop a linkage between enterprise architecture and business processes.
  • Learn techniques for evaluating threats and risk so that you can make proactive decisions to reduce the impact of security breaches.
  • Develop and practice your skills for assessing risk/threats, designing a security plan and providing a path for business continuity in the event of a security incident.



  • Confidentiality, integrity, availability
  • Identification, authentication, authorization, and audit
  • Identify, protect, detect, respond, and recover


  • Requirements analysis
  • System analysis control
  • Functional analysis
  • Design synthesis


  • Attack surface
  • Threat actors and threat vectors
  • Stages of attack
  • Modern malware
  • Insider threat


  • Secure software design
  • Defensive technologies
  • Business continuity planning
  • Cryptography
  • Penetration testing


  • Risk management frameworks
  • Systems engineering approach to design secure systems

Who should attend

This course is designed for managers, engineers, and other technical professionals with growing responsibility for cybersecurity design, administration, management, or network administration. It also applies to professionals in government or data-rich industries, such as energy, finance, healthcare and defense, whose roles are highly impacted by the security of data, as well as professionals moving into cybersecurity roles.

Trust the experts

Barbara Fox

Barbara Fox (CISSP) is a Research Scientist in the Georgia Tech Research Institute (GTRI) Cyber Technology and Information Security Laboratory (CTISL). Her research focuses on risk management, emerging threats, malware analysis, and insider threat. Ms. Fox combines a rich background in instructio...


Douglas Woods

Mr. Woods has over 33 years of diverse work experience with a primary focus on electronic systems integration and embedded systems architecture, 7 years of which have been for the Georgia Tech Research Institute (GTRI). While most of his career has been spent working with aircraft electronic syst...


Course reviews