** Regional & Continuing Education is working remotely until further notice. You can contact us via phone and email M–F, 8 a.m.–5 p.m. **
Cybersecurity for Executives Professional Development Program
Printer-friendly version

Online Program Curriculum

Photo of participant in the Cybersecurity for Executives Professional Development Program

All business organizations today can benefit from professionals with sharpened cybersecurity skills. The average cost to a company that falls victim to a malware attack is $2.4 million, in addition to an average of 50 days of lost productivity. With the potential costs so high, mitigating the very real risk of cyberattacks should be among every professional's top priorities. To help you get started, our course addresses the issues that matter most, covering high stakes security topics identified by top CISO’s as the ones that keep security professionals up at night. Our training curriculum below outlines module learning objectives, topics to cover, and exercises to help your comprehension and keep your organization safe from cybersecurity attacks.

Cybersecurity Foundations and Frameworks

In our volatile digital world, the cyber threats you don’t know about are the most dangerous ones there are. Cybersecurity  Foundations and Frameworks module teaches you to assess where your organization sits amid the cyber threat landscape and to identify risks, threats and vulnerabilities associated with your industry. Through practical learning scenarios rooted in real-world examples, this module teaches you to prioritize the most effective elements of security frameworks for your organization and to manage cybersecurity frameworks within the context of industry compliance regulations.

Cybersecurity Strategy

What cyber threats might your company realistically face today? How will you orchestrate the resources at your disposal to defend against them? Cybersecurity Strategy module teaches you to take an active role in setting and participating in cybersecurity strategy within your organization. Through deep engagement with real-world case studies, you will learn to create a strategic assessment strategy to optimize your capabilities and prioritize your spend; analyze the validity, value and reliability of threat intelligence; proactively detect and mitigate cyber risks when conducting new business initiatives and transactions; and effectively employ automation and orchestration.

Cybersecurity Risks and Industry

You might know everything you can about the cyber threat landscape, but do you have a plan of action to utilize that knowledge? This module teaches you to address gaps within your organization in terms of the people, processes, and technologies responsible for preventing, mitigating, and responding to cyberattacks. Through practical learning scenarios that address common cybersecurity incidents and concerns, you will learn to develop an incident response plan for your organization; deputize non-security staff to participate; align processes, policies, and tools to upgrade your company’s security capabilities; and prioritize strategic education initiatives for your team.

Cyber Threat Intelligence

Where do you find the latest intelligence into evolving cyber threats? And how do you know who to trust? The Cyber Threat Intelligence module trains professionals to understand and act upon the cybersecurity-related information available to them. You will learn to identify open-source, third-party and internal sources of threat intelligence; evaluate the worth and applicability of intelligence within your organization and industry; summarize gathered intelligence in a manner that is clear and intelligible to all audiences; and operationalize intelligence within your security team.

Cloud Security

Cybersecurity may seem straightforward when your data is housed on your own servers, but what happens when it’s out of your hands? The Cloud Security module prepares you with the knowledge and mindset to maintain a culture of security in an organization that utilizes cloud environments. You will learn to distinguish between on-premise security systems and those used in cloud-based services, and you will build the knowledge to identify appropriate on-premise security controls that should be present in cloud environments as well as security controls that can be applied in cloud environments. Using real-world examples, you will practice applying these controls effectively.

Cyber Risk Management (Governance Risk & Control)

Master the process of identifying potential risks, assessing the impact of those risks, and planning how to respond if the risks become reality. It is important for every organization, no matter the size or industry, to develop a cybersecurity risk management plan. You will learn to engage the enterprise, gain a management level perspective of cybersecurity within the organization, and develop plans and policies. Focus on the following risk types: technology, information, cyber risk, business resilience, reputational, and regulatory risk.

Cyber Regulations, Privacy & Law

This module encapsulates the legal issues related to use of the Internet, regulations, and law covering digital information (including information security and electronic commerce). This module is specially designed to introduce cyber law fundamentals, privacy, regulations and digital forensics. This is made possible by discussing the in-depth concepts of cyber-crime and cyber terrorism, the hacking techniques used by terrorist communities, and encryption standards used.

Cyber Incidents & Response

This module is designed to introduce how to develop three important protection plans for incident response: a Business Impact Analysis (BIA), a Business Continuity Plan (BCP) and a Disaster Recovery Plan (DRP). The module emphasizes the Recovery Time Objective (RTO), an important metric for recovering data, which is vital in the aftermath of a disaster. You'll also learn how to define a process for recovery procedures, identify a backup solution for saving your own data, test and verify your backup, and explain how you can lower RTO with proper backup and recovery procedures. At the conclusion of the module, you'll know how to develop a robust incident response plan for your business.

Your Personal Cybersecurity Capstone Project

Illustrate your success with a personalized, detailed action plan, including our organization’s goals and key performance indicators to develop an ROI strategy.


Photo of participant in the Cybersecurity for Executives Professional Development Program