Share This Course
The cyber security program is delivered in a 24 week part time and 12 week full time format and is designed for career-driven professionals to transition into the cyber security industry. The program includes pre-work, intensive practical training, industry certification and a job outcomes program in collaboration with university partners. The course content has been tailored to give students the skills that are demanded by businesses in today’s rapidly evolving job market.
Remote learning is available for this program. The interactive remote format enabled by video conferencing technology is a rich and connected experience featuring virtual break-out rooms, shared screens, digital whiteboards, peer to peer collaboration and instructor support.
“I gained an idea of what companies need and how we need to use our skills. This made it pretty easy for me to get my first job.”
Download Course Outline
Ready to Enroll?
Click to view upcoming part time cyber security program course dates.
- A game of defense and attack, ruled on both sides by economics
- Compliance vs Security
- Definitions and Language
- Encryption
- Cyber Security Practice (ongoing)
- Business Email Compromise
- Intellectual Property Theft
- Ransomware
- Resource Theft
- Other notable Case Studies
- Cyber Security Practice (ongoing)
- Networks and Network protocols
- Authentication
- Systems
- Encryption
- Cyber Security Practice (ongoing)
- Questioning technique
- Critical thinking
- Documentation
- Presentation skills
- Cyber Security Practice (ongoing)
- The Attacker’s Mindset
- Technical Attacks
- Attack Software and Tooling
- OWASP
- Cyber Security Practice (ongoing)
- Economics of Defense
- Defensive Architecture
- Assets and Perimeters
- Logs and Monitoring
- Threat Intelligence
- Cyber Security Practice (ongoing)
- Security vs ITIL
- Incident Playbooks
- Incident Management
- Crisis Communication
- Cyber Security Practice (ongoing)
- Threat Risk Assessment
- Determining the likelihood
- Economic Measurement
- Effectiveness of controls
- Cyber Security Practice (ongoing)
- Compliance Frameworks Introduction
- Common Frameworks: Overview & Scope
- Pitfalls and Common Mistakes
- Balancing Security Outcomes and Compliance Requirements
- Cyber Security Practice (ongoing)
- Capstone Project (ongoing)
- Trust and Confidence
- Administrative Functions
- Supply Chain
- Control Systems and Operational Technology: Introduction
- Capstone Project (ongoing)
- Cyber Security Practice (ongoing)
- Additional Topics: determined by students and Lead Trainer
- Job Outcomes Program
- Consultation and Presentation training
- Cyber Security Practice
- Capstone Project
Download Course Outline
Discuss with a Career Consultant
You can schedule a call with an Institute of Data Career Consultant to discuss this course.