Master Class Cyber Security Architecture & Technologies

Antwerp Management School

Antwerp Management School


Coursalytics is an independent platform to find, compare, and book executive courses. Coursalytics is not endorsed by, sponsored by, or otherwise affiliated with any business school or university.

Full disclaimer.

Read more about Business Communication

Today communication skills are more important than they ever have been. In order to get success in contemporary and such a complex, global, technologi...

Read more about Cybersecurity

The modern world of security systems is changing rapidly, and these days cybersecurity has become one of the most essential parts of protecting data s...

Read more about Information Technology

Information technology is at the heart of any process connected to utilizing computers and communication systems. It is a quite broad term that is use...

Read more about Leadership

Leadership is a form of social influence that doesn't always depend on your position in the company. However, it is true that if you want to foster a ...


Comprehensive course analysis

Unbiased reviews from past participants
Global companies alumni of this course worked for
Positions of participants who took this course
Countries where most past participants are from
Individual needs analysis

Who should attend

This master class is designed for business and IT professionals who operate at tactical or management level.

Positions held by participants include those of information technology professionals, (chief) information security officer, security manager, operational risk manager, risk analyst, security operations center (SOC) managers, line managers, (senior) IT auditor, IT consultant, enterprise/security architects, etc.

Participants are active in various types of organizations such as consulting and auditing firms, IT service providers, manufacturing, healthcare and governmental organizations.

About the course

In today’s fast evolving society, companies and organizations have become highly dependent on information-processing systems and, by extension, on waterproof security systems.

Living in the age of digital data means we have to embrace the interconnectedness that allows us to communicate and to collaborate in an infinite number of ways.

However, with an increasing international cyber threat, the need to defend and to protect the organization’s data assets is critically important. Given the fact that organizations these days are working more and more in a distributed landscape, security requirements and appropriate governance and management processes are required outside the IT silo and should be incorporated into the relevant business processes.

In order to meet present-day stringent cyber security requirements, the security and risk officer must be well aware of the organization’s mission and vision, have insight into its security architecture, stay ahead of continuously evolving -cyber- technologies and be capable of encouraging the conscious use of dealing with digital information within and outside the organization.

About the program

In this Master Class students will acquire an end-to-end view on the various topics of cyber security management and operations. The program approaches this domain from a tactical but also from an operational point of view.

  • Learn how to develop, to design and to implement secure architectures across IT systems, networks and business applications;
  • Learn how to deal with the threats from IoT, cloud, mobile, wireless and other digital technologies;
  • Acquire insights on how to stay informed about new technology advancements in order to stay ahead of potential threats and to maintain the highest cyber security levels within your organization;
  • Gain insights on how to equip yourself in case a security breach will happen to your organization.

Learning objectives

After attending this program, participants have further developed their professional knowledge and experience in:

  • Cyber & Business Information Security: gain insights into strategic topics such as regulations, trends, strategic objectives and develop those into security goals and objectives;
  • Managing Cyber Risks & Threats: gain insights into the variety of cyber risks, threats, trends, actors, tooling and techniques;
  • Cyber Security Architecture: acquire understanding of the key concepts of security architecture, incorporating best practice architectural frameworks and standards;
  • Agile Secure Development: understanding the main principles, stages and techniques for agile secure lifecycle management;
  • Cyber Security Processes & Structures: acquire understanding of security management system frameworks and associated objectives and controls;
  • Cyber Incident Management: understand and practice the process of identifying, managing, reporting and analyzing security threats or incidents;
  • Cyber Security Legal & Privacy regulations: understand the ethics and legal implications of ethical hacking;
  • Develop and practice interpersonal communication, presentation and persuasion skills in order to establish commitment for your security & assurance plan, get it executed and embed it with all stakeholders.


This Master Class is structured around 6 chapters addressing the core elements of cyber security from an architecture and technology point of view. Covering tactical and operational aspects of the profession, it will support you in the successful implementation of tactical and operational cyber security and risk management practices into your organization.

In each chapter, models and concepts are explained and illustrated through cases and exercises. All in-class sessions will be highly interactive, with a lot of focus on sharing experiences and challenging ideas.

Cyber Security Management

Cyber & Business Information Security gaining insights into strategic topics such as regulations, trends, strategic objectives and develop those into security goals and objectives.

Key topics are:

  • Understanding the strategic content and stakeholders;
  • Formulating a risk & security strategy;
  • Understand the key drivers for digital assurance (risk, security & compliance);
  • Frameworks for digital governance, management and assurance.
  • Managing Cyber Risks & Threats by gaining insights into the variety of cyber risks, threats, trends, actors, tooling and techniques.
  • Identification of relevant cyber threats and taxonomy;
  • Maturity assessment methods.

Cyber Security Architecture & Technologies

Security architecture understanding of the key concepts, best practice architectural frameworks, standards and protocols.

Key topics are:

  • Zero Trust architecture technology;
  • Identify main security architecture frameworks (SABSA, NIST, CSA, …);
  • Orchestration and automation (SOAR);
  • Continuous delivery (CI/CD) and automation;
  • Internet of things and smart devices (OT & IoT)
  • Agile Secure Development understanding the main principles, stages and techniques for agile secure lifecycle management.
  • Key topics are:
  • Agile Developments & manifests;
  • Software security fundamentals and frameworks;
  • Measures in the software security development lifecycle.

Security Operations

  • Implementing & maintaining information security processes & structures in practice. Key topics are:
  • Frameworks such as ISF, PCI, DSS, NIST,... and operational aspects
  • Security operations processes (Maturity modelling).

Key topics are:

  • Managing, supporting and reporting audit findings;
  • Statements and certifications (SOC2, ISAE).

Cyber Incident Management

Understanding and practicing the process of identifying, managing, recording and analyzing security threats or incidents in real-time.

Key topics are:

  • Security Operations Centers (SOC);
  • MITRE Attack framework;
  • Threat modelling and intelligence gathering;
  • Security Orchestration, Automation & Response (SOAR);
  • Machine Learning and Artificial Intelligence in Cyber.

Legal & Privacy

Understand the ethics and legal implications of ethical hacking.

Key topics are:

  • Main regulations for cyber security and digital assurance;
  • EU data privacy directives (GDPR);
  • Cloud Directives;
  • Privacy aspects in intelligence gathering;
  • Artificial Intelligence ethics and regulations.

Soft Skills and Leadership

Develop the necessary soft skills in order to establish the plan, execute it and embed it with all stakeholders.

Key topics are:

  • Stakeholder analysis;
  • Interpersonal communication skills;
  • Presentation & persuasion.


Marc Vael

I am passionate about what I do. It is why I get out of bed every day. I bring +25 years of innovative knowledge and solutions to boards, audit committees and executives to manage IT risks, information security / data protection and to execute IT audits. My core competencies: expertise, exper...

Yuri Bobbert

Yuri Bobbert (1973) is professor Information System Sciences. And Chief Information Security Officer (CISO) at NN-Group. Prior to NN-Group he served as an interim CISO at UWV and ten years as a CEO of a security and risk consulting firm. In 2011 Bobbert became a visiting PhD researcher at Antwerp...

Videos and materials

Master Class Cyber Security Architecture & Technologies at Antwerp Management School

From  EUR 5 900$7,124
Add coaching to your course booking

Coaching can personalize and deepen learning for you and your organization.

Something went wrong. We're trying to fix this error.

Thank you for your application

We will contact the provider to ensure that seats are available and, if there is an admissions process, that you satisfy any requirements or prerequisites.

We may ask you for additional information.

To finalize your enrollment we will be in touch shortly.


Coursalytics is an independent platform to find, compare, and book executive courses. Coursalytics is not endorsed by, sponsored by, or otherwise affiliated with any business school or university.

Full disclaimer.

Read more about Business Communication

During the courses, you will explore various communication strategies developed by experts in psychology, experienced enterprises, and professors of leading universities. Throughout the Business Communication courses, you also will be faced with an o...

Read more about Cybersecurity

Сybersecurity courses offer an excellent opportunity to develop the knowledge and skills necessary to implement a perfect cybersecurity strategy that will accelerate the main security protocols' efficiency. After the successful completion of cybersec...

Read more about Information Technology

A large part of the courses provides basic information so the students are not required to have any IT qualifications before enrolling. Most of the IT learning programs are also broken down into specific areas of interest, such as systems analysis, a...

Read more about Leadership

One evident benefit of joining a leadership course is gaining the knowledge essential for motivating people for high performance. After completing a leadership course, you will be capable of assessing your trustworthiness as perceived by your colleag...

Because of COVID-19, many providers are cancelling or postponing in-person programs or providing online participation options.

We are happy to help you find a suitable online alternative.