Cybersecurity Leadership Certificate Curriculum
Information security has become a top priority for organizations; consequently, employers are seeking leaders who understand how to protect, detect, defend, and respond to cybersecurity attacks. The Cybersecurity Leadership (CSL) Certificate, a program comprised of four courses totaling 12 credit hours, is designed to prepare professionals for this new role and employment opportunities. The CSL program is designed to serve individuals of all backgrounds – not just CIS majors.
The program can be completed in three semesters (one academic year). Courses include labs and learning experiences that help prepare professionals to secure and defend information systems. In addition to gaining knowledge of the fundamentals of information security, students will also acquire a strong foundation in risk and risk management. Included in the coursework is preparation for the ISACA certification exam.
Six hours of the CSL courses can be counted toward degree completion for the 30-hour MBA degree. Admission into the CSL Certificate program does not guarantee admission into the MBA program. All admission requirements and prerequisites must be met for acceptance into the MBA program.
Required Courses (12 hrs.)
Principles and function of cyber-risk management. Special attention will be given to how cyber risk management fits into an overall risk management program. Students will become familiar with ways to approach the risk, the types of exposures and future issues in the area of cyber risk management. This course is designed to mimic The Institute's earning objectives for the “Cyber 301” course to prepare students to sit for the exam after the course if they choose.
This course provides an overview of security challenges and strategies of countermeasure in the information systems environment. Topics include definition of terms, concepts, elements, and goals incorporating industry standards and practices with a focus on availability, vulnerability, integrity, and confidentiality aspects of information systems.
This hands-on course provides an introduction to tools and techniques used by hacker to penetrate corporate networks. Topics include vulnerabilities of operating systems, incident-handling methods, and an overview of the process and methodologies used in penetration testing including ethical and legal implications.
Information Security protects information with a perpetual goal of confidentiality, integrity, and availability of the data. Individuals, private organizations, and government organizations have responsibilities and protections under the law with respect to their data. This course examines the relationship between Information Security goals and the legal requirements associated with these goals.