Cybersecurity Management

Kelley School of Business

Kelley School of Business


Coursalytics is an independent platform to find, compare, and book executive courses. Coursalytics is not endorsed by, sponsored by, or otherwise affiliated with any business school or university.

Full disclaimer.

Read more about Human Capital Management

In the rapidly changing global marketplace, companies that consider Human Resources as purely business-serving are inevitably falling behind. That is ...

Read more about Information Technology

Information technology is at the heart of any process connected to utilizing computers and communication systems. It is a quite broad term that is use...

Read more about Transportation and Logistics

At the moment, the logistics industry is thriving, providing millions of workplaces all over the world. It is safe to say that almost all the companie...

Who should attend

A bachelor's degree is required. No prior training in technology, business, or law is required.

About the course

Gain skills in cybersecurity risk management best practices to better protect your company.

The Cybersecurity Management certificate is designed to meet the needs of early- and mid-career professionals who want to set themselves apart with a grounding in cybersecurity risk management best practices. Beyond providing an overview of concepts in a particular area of cybersecurity, the curriculum has been designed to offer in-depth coverage of the three arenas recruiters have told us they want to see in cybersecurity professionals:

  • Cybersecurity Literacy
  • IT Risk Management
  • Global Cybersecurity Law and Policy

Although cybersecurity has been a subject of interest for companies since the late 1990s, increasingly it is an important part of nearly every aspect of business decision-making from due diligence in mergers and acquisitions to supply chain security and enterprise risk management. Managers who understand the multifaceted cyber threat and what they can do to mitigate the risk are at a competitive advantage.

Course Curriculum

Think about where you are currently in your career, and where you want to be. Then, learn more about the three required courses and choose one additional course as an elective to earn your certificate:

Theme 1: Cybersecurity Literacy

T579: Information Systems Security (3 credit hours)

This class covers the broad aspects of information security. Topics covered include: physical security, password security, biometrics, an intensive review of TCP/IP as it relates to security, routers, Network Intrusion Detection, NAT, firewalls, content-filtering, locking down the client machine, Linux and Unix, encryption, vulnerability testing, and a whole series of attacks. Hands-on labs are also an essential component of the course. In addition to the above topics, the class also covers the managerial, human, auditing, and legal aspects of security.

Theme 2: IT Risk Management

T560: IT Risk Management (3 credit hours)

This class covers technology and how to leverage a company’s investment in its technology to achieve its business and IT strategy. We will do this by (1) analyzing the value that IT delivers, (2) the risks that IT manages and (3) the cost of providing service to the business.

Theme 3: Global Cybersecurity Law and Policy

T578: Cybersecurity Law and Policy (3 credit hours)

Recent cyber-attacks have highlighted the importance of cybersecurity. Organizations need professionals at all levels—not just in the IT department—who understand the technical, legal and business aspects of cybersecurity risk management, as well as how to safeguard privacy and intellectual property. This new course takes an interdisciplinary, global approach to introduce students to cybersecurity risk management. Course content includes U.S., comparative, and international law related to managing cyber-attacks along with connected hot topics such as Internet governance, blockchain, Internet of Things, privacy, and cybersecurity codes of conduct. The primary aim of the course is to provide students with a basic working knowledge of cybersecurity law and policy, focusing on the United States but put in a global perspective.


C522: Information Technology (3 credit hours)

Study of information systems management issues including skill and talent management; IT costs, budgets, value, and chargeback systems; priority setting and financial justification of IT investments; project management; runaway projects and underperforming vendors; security risks and crises; emerging technology policies; communications with other senior executives; vendor management; infrastructure standardization; support for innovation; and risk management.

C533: Data Warehousing, Data Mining, and Visualization (3 credit hours)

Understand and utilize unsupervised models including principal components analysis, cluster analysis, and market basket analysis. Understand business intelligence-related concepts:

  • The notion of corporate information factory,
  • Dashboards and scorecards that support the businesses,
  • Different types of problems related to data quality including a methodology for maintaining data quality, and
  • An overview of a variety of software tools that are employed in the development of a data warehouse: ETL (extraction, transformation, and loading) and analytic tools.

Recognize some of the key issues for managerial considerations:

  • The tools of metrics in decision-making,
  • Types of business risks along with how to alleviate the risks associated with implementing informational systems, and
  • Issues related to data governance.

C548: Managing Intellectual Property in Global Business (3 credit hours)

When businesses unwisely share their core technology, they risk losing it. Despite this fact, there currently is no single regulatory scheme that provides international protection for proprietary information. Further, while most countries offer some degree of legal protection for creative products, processes and services, the rigor of this protection varies throughout the world. This course is designed to acquaint global business managers with the legal and practical issues involved in the protection of intellectual property. It introduces students to the basic types of intellectual property (patents, copyrights, trademarks and trade secrets) and the key differences in how they are protected around the world. Ultimately, upon completion of this course, students will better understand how to protect their company’s intellectual property when doing business in the global environment.

Cybersecurity Management at Kelley School of Business

Price Upon Request

Something went wrong. We're trying to fix this error.

Thank you for your inquiry

Someone from the Coursalytics team will be in touch with you soon.


Coursalytics is an independent platform to find, compare, and book executive courses. Coursalytics is not endorsed by, sponsored by, or otherwise affiliated with any business school or university.

Full disclaimer.

Read more about Human Capital Management

Basically, HR management can be defined as the effective use of human resources in an organization with the help of various management strategies. Due to the diversity of the courses, you should be aware of your needs while selecting one. Human Capit...

Read more about Information Technology

A large part of the courses provides basic information so the students are not required to have any IT qualifications before enrolling. Most of the IT learning programs are also broken down into specific areas of interest, such as systems analysis, a...

Read more about Transportation and Logistics

Transportation and logistics courses mainly focus on global supply chain management and its key features, including air and ocean cargo administration, international documentation, end-to-end supply chain infrastructure, etc. Also, courses show how t...

Because of COVID-19, many providers are cancelling or postponing in-person programs or providing online participation options.

We are happy to help you find a suitable online alternative.