Graduate Cybersecurity Program


8 and 12 weeks sessions options available

5–6 hours per week, online

Weekly modules, flexible learning

Multiple payment options

You Will Walk Away With

  1. The ability to draft, strategize and develop a cyber risk mitigation strategy, including the appropriate legal and compliance steps that need to be taken when responding to cyberattacks and reporting cyberattacks to law enforcement.
  1. An in-depth understanding of the different types of cyberattacks, the business systems that are most at risk, and the importance of an organization-wide
    approach to cybersecurity.
  1. A premier training program from IT Governance and Cybersecurity Institute
    (ITGCSI), in association with industry practitioners a, as validation of your
    newfound cybersecurity knowledge and skills, as well as access to a global
    network of likeminded cybersecurity professionals.

Program Chair

Dr Richard Young

Dr. Young, the Program Director has more than 25 years of executive hands-on
expertise for establishing and maintaining information and cybersecurity enterprise
strategy to ensure information assets are adequately protected. 

For the past 12 years Dr. Young has been facilitating some of world’s top graduate cyber risk programs, including that of Harvard University, Southern California and Ithaca College, just to name a few. He is a holder of top industry certifications (CCISO, CISSP, CGEIT, etc.) and is passionate about the security of our global critical infrastructure.

Some Of Our Modules

Module 1:
Security Operations

The module introduces learners to the Security Operations Center
(SOC) capabilities, roles and responsibilities of the SOC staff.
Participants will interact with live SOC content where sources from
different networks and security classifications can be securely
connected to the system so content from multiple sources can be
combined into an optimal representation of mission-critical

Module 2:
Secure Network Administration

This module introduces participants to the fundamentals of
Network Security through a hands-on journey of recognizing basic
IT security threats and various ways to mitigate those threats. This
involves an exploration of red-team (offensive security
professionals)vs. blue-team (defensive security professionals)
spheres of work, setting you up for the first, user-facing domains of
cybersecurity: systems security

Module 3:
Cloud Security

This module will introduce you to the language of cloud security.
learners will be able to advise and speak about a wide range of
cybersecurity topics and help your organization successfully
navigate the challenges and opportunities presented by cloud
service providers. This module covers Amazon Web Services, Azure,
Google Cloud, and other cloud service providers (CSPs).

Module 4:
Policy, Regulation and Data Governance

This module focuses on data privacy laws, policies and standards
in major international jurisdictions, skills essential to privacy
operations management, and preparation for certification testing.
Explore how IT professionals engaged in creating and implementing
technical privacy solutions and data scientists/analysts who mine
and analyze data for customer insights.

An Online Education That Sets You Apart

This online program from ITGCSI is delivered in collaboration with , Duke University. Join a growing community of global professionals who have already benefited from the opportunity to:

Develop relevant, sought-after skills and earn invaluable recognition from an international selection of universities, entirely online

Enjoy a personalized, people-mediated online learning experience created to make you feel supported at every step

Gain verifiable and relevant competencies through a career-focused curriculum that achieves specific learning outcomes and skill gains

Get More Information

Drop Us a Line.