A comprehensive executive online program comprised of 15 modules designed to transform nontechnical business executives and leaders into cyber-savvy business executives and leaders.
The introduction module provides the background, education, credentials and experience of your cybersecurity leadership instructor; a program overview; identifies the benefits of becoming cyber savvy; and understanding the overall impact of a cyber breach to the organization.
Module 1: Integrating the Cyber Threat in Strategic Planning
Module 1 provides instruction on the importance of implementing a cyber savvy senior leadership team for the organization to strategically improve the enterprise wide cybersecurity program.
Module 2: Understanding the Cyber Threat Landscape and the Basics of Information Technology
Module 2 provides instruction on information assurance, today's cyber threat actors and landscape, the basics of network security, and considerations for improvement of the enterprise wide cybersecurity program.
Module 3: Understanding Malicious Software
Module 3 provides instruction of malicious software and considerations for securing the enterprise from malicious software in an enterprise wide cybersecurity program.
Module 4: Information Operations
Module 4 provides instruction on nation state level information operations, efforts against nation state/Advanced Persistent Threat (APT) actors; and considerations for securing the enterprise from nation state/APT actors in an enterprise wide cybersecurity program.
Module 5: Critical Infrastructure and Industrial Control Systems
Module 5 provides instruction on the U.S. critical infrastructure sectors, Industrial Control Systems (ICS), the Internet of Things (IoT) and considerations in securing ICS and IoT within an enterprise wide cybersecurity program.
Module 6: Wireless and Mobile Devices
Module 6 provides instruction on wireless and mobile devices and considerations in securing wireless and mobile devices within an enterprise wide cybersecurity program.
Module 7: Web Infrastructure and Third-Party Risks
Module 7 provides instruction on the web, third party vendor, and supply chain cyber risk and considerations for securing web, third party vendor and supply chain within an enterprise wide cybersecurity program.
Module 8: Cybercrime and Hacktivism
Module 8 provides instruction on cyber-criminal tools and schemes, insider threats, hacktivists and considerations in securing the enterprise against cyber-criminals, insiders and hacktivists in an enterprise wide cybersecurity program.
Module 9: The Cyber Underground
Module 9 provides instruction on the cyber underground and considerations in securing the enterprise from the cyber underground threat in an enterprise wide cybersecurity program.
Module 10: Cyber Defense, Incident Response and Recovery
Module 10 provides instruction on the enterprise level defense in depth strategy, incident response and recovery capabilities, and considerations in implementing enterprise level cyber defense, incident response and recovery capabilities in an enterprise wide cybersecurity program.
Module 11: Cyber Education and Cyber Training
Module 11 provides instruction on cybersecurity education and training resources available to an organization; and considerations in improving an organization's cybersecurity capabilities to support an enterprise wide cybersecurity program.
Module 12: Cyber Regulators and Cybersecurity Frameworks
Module 12 provides instruction on cybersecurity regulation, cybersecurity regulators, cybersecurity frameworks; and considerations in implementing a cybersecurity frameworks in an enterprise wide cybersecurity program.
Module 13: Private Sector and Public Sector Partnerships
Module 13 provides instruction on private and public sector cybersecurity partners available to organizations; and considerations in establishing private and public sector partnerships in an enterprise wide cybersecurity program.
Module 14: Strategic Challenges Facing the Enterprise
Module 14 provides a review of each of the program's modules and provides recommendations in addressing strategic challenges organizations are facing in addressing the cybersecurity threat in today's environment.