THE GEORGE WASHINGTON UNIVERSITY SCHOOL OF BUSINESS
  • Home
  • About Us
    • About GWSB
    • About zSchool
  • Our Programs
    • Design Thinking Certificate >
      • The DT Difference
      • Faculty and Leadership
      • Academic Overview
      • Upcoming Classes
      • Curriculum
      • In-Class Experience
      • Online Experience
    • Customer Experience Certificate >
      • The CX Difference
      • Faculty and Leadership
      • Academic Overview​
      • Upcoming Classes
      • Curriculum
      • In-Classroom Program
      • Online Program
      • Program Faq
      • Register Now
    • Transformative Leadership in Disruptive Times >
      • THE TLDT DIFFERENCE
      • Faculty & Leadership
      • Upcoming Classes
      • Curriculum
      • Register Now
    • Going Virtual Certificate >
      • The GV Difference
      • Academic Overview
      • Upcoming Classes
      • Curriculum
      • Live Virtual Class Experience
      • Online Experience
      • Register Now
    • Cybersecurity Certificate >
      • Cybersecurity Difference
      • Academic Overview
      • Upcoming Classes
      • Curriculum
      • In Class Experience
      • Online Experience
      • Program Faq
      • Register Now
    • Digital Marketing Certificate >
      • Digital Marketing Difference
      • Academic Overview
      • Faculty and Leadership
      • Upcoming Classes
      • Curriculum
      • In Class Experience
      • Online Experience
      • Register Now
  • Contact Us
    • Custom Programs
EXECUTIVE PROGRAMS
at The George Washington University School of Business
offered in partnership with the Zschool

Picture
Picture
Picture
Picture
Picture
Picture
Picture

Cybersecurity Certificate Curriculum

Program Summary

All business organizations today can benefit from professionals with sharpened cybersecurity skills. The average cost to a company that falls victim to a malware attack is $2.4 million, in addition to an average of 50 days of lost productivity. With the potential costs so high, mitigating the very real risk of cyberattacks should be among every professional's top priorities. To help you get started, our course address the issues that matter most, covering high stakes security topics identified by top CISO’s as
the ones that keep security professionals up at night. Our training curriculum outlines learning objectives,
topics to cover and exercises to help your comprehension and keep your organization safe from
cybersecurity attacks.

Module 1
CybersecurityFoundations and Frameworks

In our volatile digital world, the cyber threats you don’t know about are the most dangerous ones there are. Cybersecurity Foundations and Frameworks teaches you to assess where your organization sits amid the cyber threat landscape and to identify risks, threats and vulnerabilities associated with
your industry. Through practical learning scenarios rooted in real-world examples, this module teaches you to prioritize the most effective elements of security frameworks for your organization and to manage cybersecurity frameworks within the context of industry compliance regulations.​

​Module 2
​Cybersecurity Strategy

What cyber threats might your company realistically face today? How will you orchestrate the resources at your disposal to defend against them? Cybersecurity Strategy teaches you to take an active role in setting and participating in cybersecurity strategy within your organization. Through deep engagement with real-world case studies, you will learn to create a strategic assessment strategy to optimize your capabilities and prioritize your spend; analyze the validity, value and reliability of threat intelligence;
proactively detect and mitigate cyber risks when conducting new business initiatives and transactions; and effectively employ automation and orchestration.

​Module 3
Cybersecurity Risks and Industry

Module 4
​Cyber Threat Intelligence

You might know everything you can about the cyber threat landscape, but do you have a plan of action to utilize that knowledge? This module teaches you to address gaps within your organization in terms of the people, processes and technologies responsible for preventing, mitigating and responding to cyberattacks. Through practical learning scenarios that address common cybersecurity incidents and concerns, you will learn to develop an incident response plan for your  rganization; deputize nonsecurity staff to participate; align processes, policies and tools to upgrade your company’s security capabilities; and prioritize strategic education initiatives for your team.
Where do you find the latest intelligence into evolving cyber threats? And how do you know who to trust? Cyber Threat Intelligence trains
professionals to understand and act upon the cybersecurity-related
information available to them. You will learn to identify open-source, thirdparty and internal sources of threat intelligence; evaluate the worth and applicability of intelligence within your organization and industry; summarize gathered intelligence in a manner that is clear and intelligible to all audiences; and operationalize intelligence within your security team.

Module 5
​Cloud Security

Module 6
Cyber Risk Management
(Governance Risk & Control)

Cybersecurity may seem straightforward when your data is housed on your own servers, but what happens when it’s out of your hands? Cloud Security prepares you with the knowledge and mindset to maintain a culture of security in an organization that utilizes cloud environments. You will learn to distinguish between on-premise security systems and those used in cloudbased services, and you will build the knowledge to identify appropriate onpremise security controls that should be present in cloud environments as well as security controls that can be applied in cloud environments. Using real-world examples, you will practice applying these controls effectively.
Master the process of identifying potential risks, assessing the impact of those risks, and planning how to respond if the risks become reality. It is important for every organization, no matter the size or industry, to develop a cybersecurity risk management plan. You will learn to engage the enterprise, gain a management level perspective of cybersecurity within the organization, and develop plans and policies. Focus on the following risk types, Technology, Information, Cyber Risk, Business Resilience, Reputational and Regulatory Risk

Module 7
Cyber Regulations, Privacy & Law

This module encapsulates the legal issues related to use of the Internet, regulations and law covering digital information (including information security and electronic commerce. The module is specially designed to introduce Cyber Law Fundamentals, Privacy, Regulations and Digital Forensics. This is made possible by discussing the in-depth concepts of Cyber-crime and Cyber Terrorism, the hacking techniques used by terrorist communities, encryption standards used.

​Module 8
Cyber Incidents & Response

This module is designed to introduce how to develop three important
protection plans for incident response: a business impact analysis (BIA), a Business Continuity Plan (BCP) and a Disaster Recovery Plan (DRP). The module emphasizes the recovery time objective (RTO), an important metric for recovering data, which is vital in the aftermath of a disaster. You'll also learn how to define a process for recovery procedures, identify a backup solution for saving your own data, test and verify your backup and explain how you can lower RTO with proper backup and recovery procedures. At the conclusion of the module, you'll know how to develop a robust incident response plan for your business.


Your Personal Cybersecurity Capstone Project​

Illustrate your success with a personalized, detailed action plan including your organization's goals and key performance indicators to develop an ROI strategy.

Picture
712 H Street NE  #1530
Washington, D.C. 20002

Contact:

Kevin Kellbach
Title: Director, CLAI        
Phone: 202-313-7699   
Email: kellbach@gwu.edu  
Webpage: https://business.gwu.edu/kevin-kellbach

EXECUTIVE PROGRAMS at The George Washington University School of Business powered by the Zschool

Empowering individuals and firms to re-imagine how they approach business in today's competitive landscape.
Powered by zSchool
  • Home
  • About Us
    • About GWSB
    • About zSchool
  • Our Programs
    • Design Thinking Certificate >
      • The DT Difference
      • Faculty and Leadership
      • Academic Overview
      • Upcoming Classes
      • Curriculum
      • In-Class Experience
      • Online Experience
    • Customer Experience Certificate >
      • The CX Difference
      • Faculty and Leadership
      • Academic Overview​
      • Upcoming Classes
      • Curriculum
      • In-Classroom Program
      • Online Program
      • Program Faq
      • Register Now
    • Transformative Leadership in Disruptive Times >
      • THE TLDT DIFFERENCE
      • Faculty & Leadership
      • Upcoming Classes
      • Curriculum
      • Register Now
    • Going Virtual Certificate >
      • The GV Difference
      • Academic Overview
      • Upcoming Classes
      • Curriculum
      • Live Virtual Class Experience
      • Online Experience
      • Register Now
    • Cybersecurity Certificate >
      • Cybersecurity Difference
      • Academic Overview
      • Upcoming Classes
      • Curriculum
      • In Class Experience
      • Online Experience
      • Program Faq
      • Register Now
    • Digital Marketing Certificate >
      • Digital Marketing Difference
      • Academic Overview
      • Faculty and Leadership
      • Upcoming Classes
      • Curriculum
      • In Class Experience
      • Online Experience
      • Register Now
  • Contact Us
    • Custom Programs