About the course
Gain skills in cybersecurity risk management best practices to better protect your company.
The Cybersecurity Management certificate is designed to meet the needs of early- and mid-career professionals who want to set themselves apart with a grounding in cybersecurity risk management best practices. Beyond providing an overview of concepts in a particular area of cybersecurity, the curriculum has been designed to offer in-depth coverage of the three arenas recruiters have told us they want to see in cybersecurity professionals:
- Cybersecurity Literacy
- IT Risk Management
- Global Cybersecurity Law and Policy
Although cybersecurity has been a subject of interest for companies since the late 1990s, increasingly it is an important part of nearly every aspect of business decision-making from due diligence in mergers and acquisitions to supply chain security and enterprise risk management. Managers who understand the multifaceted cyber threat and what they can do to mitigate the risk are at a competitive advantage.
Think about where you are currently in your career, and where you want to be. Then, learn more about the three required courses and choose one additional course as an elective to earn your certificate:
Theme 1: Cybersecurity Literacy
T579: Information Systems Security (3 credit hours)
This class covers the broad aspects of information security. Topics covered include: physical security, password security, biometrics, an intensive review of TCP/IP as it relates to security, routers, Network Intrusion Detection, NAT, firewalls, content-filtering, locking down the client machine, Linux and Unix, encryption, vulnerability testing, and a whole series of attacks. Hands-on labs are also an essential component of the course. In addition to the above topics, the class also covers the managerial, human, auditing, and legal aspects of security.
Theme 2: IT Risk Management
T560: IT Risk Management (3 credit hours)
This class covers technology and how to leverage a company’s investment in its technology to achieve its business and IT strategy. We will do this by (1) analyzing the value that IT delivers, (2) the risks that IT manages and (3) the cost of providing service to the business.
Theme 3: Global Cybersecurity Law and Policy
T578: Cybersecurity Law and Policy (3 credit hours)
Recent cyber-attacks have highlighted the importance of cybersecurity. Organizations need professionals at all levels—not just in the IT department—who understand the technical, legal and business aspects of cybersecurity risk management, as well as how to safeguard privacy and intellectual property. This new course takes an interdisciplinary, global approach to introduce students to cybersecurity risk management. Course content includes U.S., comparative, and international law related to managing cyber-attacks along with connected hot topics such as Internet governance, blockchain, Internet of Things, privacy, and cybersecurity codes of conduct. The primary aim of the course is to provide students with a basic working knowledge of cybersecurity law and policy, focusing on the United States but put in a global perspective.
C522: Information Technology (3 credit hours)
Study of information systems management issues including skill and talent management; IT costs, budgets, value, and chargeback systems; priority setting and financial justification of IT investments; project management; runaway projects and underperforming vendors; security risks and crises; emerging technology policies; communications with other senior executives; vendor management; infrastructure standardization; support for innovation; and risk management.
C533: Data Warehousing, Data Mining, and Visualization (3 credit hours)
Understand and utilize unsupervised models including principal components analysis, cluster analysis, and market basket analysis. Understand business intelligence-related concepts:
- The notion of corporate information factory,
- Dashboards and scorecards that support the businesses,
- Different types of problems related to data quality including a methodology for maintaining data quality, and
- An overview of a variety of software tools that are employed in the development of a data warehouse: ETL (extraction, transformation, and loading) and analytic tools.
Recognize some of the key issues for managerial considerations:
- The tools of metrics in decision-making,
- Types of business risks along with how to alleviate the risks associated with implementing informational systems, and
- Issues related to data governance.
C548: Managing Intellectual Property in Global Business (3 credit hours)
When businesses unwisely share their core technology, they risk losing it. Despite this fact, there currently is no single regulatory scheme that provides international protection for proprietary information. Further, while most countries offer some degree of legal protection for creative products, processes and services, the rigor of this protection varies throughout the world. This course is designed to acquaint global business managers with the legal and practical issues involved in the protection of intellectual property. It introduces students to the basic types of intellectual property (patents, copyrights, trademarks and trade secrets) and the key differences in how they are protected around the world. Ultimately, upon completion of this course, students will better understand how to protect their company’s intellectual property when doing business in the global environment.
Because of COVID-19, many providers are cancelling or postponing in-person programs or providing online participation options.
We are happy to help you find a suitable online alternative.