8 and 12 weeks sessions options available
5–6 hours per week, online
Weekly modules, flexible learning
Multiple payment options
Dr. Young, the Program Director has more than 25 years of executive hands-on
expertise for establishing and maintaining information and cybersecurity enterprise
strategy to ensure information assets are adequately protected.
For the past 12 years Dr. Young has been facilitating some of world’s top graduate cyber risk programs, including that of Harvard University, Southern California and Ithaca College, just to name a few. He is a holder of top industry certifications (CCISO, CISSP, CGEIT, etc.) and is passionate about the security of our global critical infrastructure.
Module 1:
Cybersecurity Risks and Industry
This module teaches you to address gaps within your organization in terms of the people, processes and technologies responsible for preventing, mitigating and responding to cyberattacks. Through practical learning scenarios that address common cybersecurity incidents and concerns, you will learn to develop an incident response plan for your organization; deputize non-security staff to participate; align processes, policies and tools to upgrade your company’s security capabilities; and prioritize strategic education initiatives for your team.
Module 2:
Cyber Incidents & Response
This module is designed to introduce how to develop three important protection plans for incident response: a business impact analysis (BIA), a Business Continuity Plan (BCP) and a Disaster Recovery Plan (DRP). At the conclusion of the module, you’ll know how to develop a robust incident response plan for your business.
Module 3:
Cybersecurity Strategy
Cybersecurity Strategy teaches you to take an active role in setting and participating in cybersecurity strategy within your organization. You will learn to create a strategic assessment strategy to optimize your capabilities and prioritize your spend, proactively detect and mitigate cyber risks when conducting new business initiatives and transactions; and effectively employ automation and orchestration.
Module 4:
Cyber Risk Management
Master the process of identifying potential risks, assessing the impact of those risks, and planning how to respond if the risks become reality. You will learn to engage the enterprise, gain a management level perspective of cybersecurity within the organization, and develop plans and policies.
This online program from ITGCSI is delivered in collaboration with , Duke University. Join a growing community of global professionals who have already benefited from the opportunity to:
Develop relevant, sought-after skills and earn invaluable recognition from an international selection of universities, entirely online
Enjoy a personalized, people-mediated online learning experience created to make you feel supported at every step
Gain verifiable and relevant competencies through a career-focused curriculum that achieves specific learning outcomes and skill gains
Cookie | Duration | Description |
---|---|---|
cookielawinfo-checkbox-analytics | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Analytics". |
cookielawinfo-checkbox-functional | 11 months | The cookie is set by GDPR cookie consent to record the user consent for the cookies in the category "Functional". |
cookielawinfo-checkbox-necessary | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookies is used to store the user consent for the cookies in the category "Necessary". |
cookielawinfo-checkbox-others | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Other. |
cookielawinfo-checkbox-performance | 11 months | This cookie is set by GDPR Cookie Consent plugin. The cookie is used to store the user consent for the cookies in the category "Performance". |
viewed_cookie_policy | 11 months | The cookie is set by the GDPR Cookie Consent plugin and is used to store whether or not user has consented to the use of cookies. It does not store any personal data. |