Cybersecurity Leadership Certificate Curriculum
Start in October and finish in August
Information security has become a top priority for organizations. Be the leader employers are seeking with knowledge on how to protect, detect, defend, and respond to cybersecurity attacks. The 12-credit hour Cybersecurity Leadership (CSL) Certificate is designed to prepare professionals for this new role and employment opportunities.
The CSL program is designed to serve individuals of all backgrounds – not just those with programming experience. Courses include labs and learning experiences that help prepare professionals to secure and defend information systems. In addition to gaining knowledge of the fundamentals of information security, students will also acquire a strong foundation in risk and risk management. Included in the coursework is preparation for the ISACA certification exam.
This can be a standalone program or be applied to the Master in Integrative Leadership degree.
This certificate includes four courses, all offered online:
Required Courses (12 hrs.)
Principles and function of cyber risk management. Special attention will be given to how cyber risk management fits into an overall risk management program. Students will become familiar with ways to approach the risk, the types of exposures and future issues in the area of cyber risk management. This course is designed to mimic The Institute's earning objectives for the “Cyber 301” course to prepare students to sit for the exam after the course if they choose.
This course provides an overview of security challenges and strategies of countermeasure in the information systems environment. Topics include definition of terms, concepts, elements, and goals incorporating industry standards and practices with a focus on availability, vulnerability, integrity, and confidentiality aspects of information systems.
Prerequisite: MBA 655.
This hands-on course provides an introduction to tools and techniques used by hacker to penetrate corporate networks. Topics include vulnerabilities of operating systems, incident-handling methods, and an overview of the process and methodologies used in penetration testing including ethical and legal implications.
Information Security protects information with a perpetual goal of confidentiality, integrity, and availability of the data. Individuals, private organizations, and government organizations have responsibilities and protections under the law with respect to their data. This course examines the relationship between Information Security goals and the legal requirements associated with these goals.
(Admission into the CSL Certificate program does not guarantee admission into the MBA program. All admission requirements and prerequisites must be met for acceptance into the MBA program.)