Cybersecurity Certificate CurriculumProgram Summary
All business organizations today can benefit from professionals with sharpened cybersecurity skills. The average cost to a company that falls victim to a malware attack is $2.4 million, in addition to an average of 50 days of lost productivity. With the potential costs so high, mitigating the very real risk of cyberattacks should be among every professional's top priorities. To help you get started, our course address the issues that matter most, covering high stakes security topics identified by top CISO’s as the ones that keep security professionals up at night. Our training curriculum outlines learning objectives, topics to cover and exercises to help your comprehension and keep your organization safe from cybersecurity attacks. Module 1
|
Module 3
|
Module 4
|
You might know everything you can about the cyber threat landscape, but do you have a plan of action to utilize that knowledge? This module teaches you to address gaps within your organization in terms of the people, processes and technologies responsible for preventing, mitigating and responding to cyberattacks. Through practical learning scenarios that address common cybersecurity incidents and concerns, you will learn to develop an incident response plan for your rganization; deputize nonsecurity staff to participate; align processes, policies and tools to upgrade your company’s security capabilities; and prioritize strategic education initiatives for your team.
|
Where do you find the latest intelligence into evolving cyber threats? And how do you know who to trust? Cyber Threat Intelligence trains
professionals to understand and act upon the cybersecurity-related information available to them. You will learn to identify open-source, thirdparty and internal sources of threat intelligence; evaluate the worth and applicability of intelligence within your organization and industry; summarize gathered intelligence in a manner that is clear and intelligible to all audiences; and operationalize intelligence within your security team. |
Module 5
|
Module 6
|
Cybersecurity may seem straightforward when your data is housed on your own servers, but what happens when it’s out of your hands? Cloud Security prepares you with the knowledge and mindset to maintain a culture of security in an organization that utilizes cloud environments. You will learn to distinguish between on-premise security systems and those used in cloudbased services, and you will build the knowledge to identify appropriate onpremise security controls that should be present in cloud environments as well as security controls that can be applied in cloud environments. Using real-world examples, you will practice applying these controls effectively.
|
Master the process of identifying potential risks, assessing the impact of those risks, and planning how to respond if the risks become reality. It is important for every organization, no matter the size or industry, to develop a cybersecurity risk management plan. You will learn to engage the enterprise, gain a management level perspective of cybersecurity within the organization, and develop plans and policies. Focus on the following risk types, Technology, Information, Cyber Risk, Business Resilience, Reputational and Regulatory Risk
|
Module 7
|
Module 8
|
Your Personal Cybersecurity Capstone Project
Illustrate your success with a personalized, detailed action plan including your organization's goals and key performance indicators to develop an ROI strategy.