Cybersecurity Leadership Certificate Curriculum
- The program can be completed in three (Fall, Spring, and Summer) or four (Summer, Fall, Spring, and Summer) semesters.
- Six hours of the CSL program can be counted toward degree completion for the 30-hour MBA degree.
- Courses include labs and learning experiences that help prepare professionals to secure and defend information systems. In addition to gaining knowledge of the fundamentals of information security, students will also acquire a strong foundation in risk and risk management.
- Included in the coursework is preparation for the ISACA certification exam (not required as part of the program).
Admission into the CSL Certificate program does not guarantee admission into the MBA program. All admission requirements and prerequisites must be met for acceptance into the MBA program.
Required Courses 12 hrs.
Principles and function of Cyber risk management. Special attention will be given to how cyber risk management fits into an overall risk management program. Students will become familiar with ways to approach the risk, the types of exposures and future issues in the area of cyber risk management. This course is designed to mimic The Institutes learning objectives for the “Cyber 301” course to prepare students to sit for the exam after the course if they choose.
This course provides an overview of security challenges and strategies of countermeasure in the information systems environment. Topics include definition of terms, concepts, elements, and goals incorporating industry standards and practices with a focus on availability, vulnerability, integrity, and confidentiality aspects of information systems.
This hands-on course provides an introduction to tools and techniques used by hacker to penetrate corporate networks. Topics include vulnerabilities of operating systems, incident-handling methods, and an overview of the process and methodologies used in penetration testing including ethical and legal implications.
Information Security protects information with a perpetual goal of confidentiality, integrity, and availability of the data. Individuals, private organizations, and government organizations have responsibilities and protections under the law with respect to their data. This course examines the relationship between Information Security goals and the legal requirements associated with these goals.