Professional Certificate in Cyber Security and Risk Management
- 3 Months / Onsite and Online
- Intakes: Every Month
A Professional Certificate in Cyber Security and Risk Management is a formal educational program aimed at equipping individuals with advanced knowledge and practical skills in cybersecurity and risk management. The program is designed to address the growing need for skilled professionals who can protect organizations from cyber threats and manage risks effectively.
Course Description
The Professional Certificate in Cyber Security and Risk Management is designed to equip participants with the essential knowledge and skills needed to protect information assets, manage risks, and ensure data integrity in today’s digital landscape. This comprehensive program blends theoretical foundations with practical applications, preparing individuals for advanced roles in cybersecurity and risk management.
Learning Outcomes
Core Principles
Grasp the fundamentals of cybersecurity, including confidentiality, integrity, and availability, and implement layered security measures to protect systems and data.
Security Architectures
Describe various security architectures and apply the principle of least privilege to ensure that users have only the necessary access rights.
Security Policies and Procedures
Develop, implement, and enforce security policies and procedures to establish a secure operational environment.
Threat Landscape Analysis
Analyze the current threat landscape, identify threat actors, and utilize threat intelligence to inform security decisions and strategies.
Vulnerability Assessment and Penetration Testing
Conduct vulnerability assessments and penetration tests, and implement security controls to mitigate risks effectively.
Incident Response
Develop and implement incident response plans, conduct forensic investigations, and communicate effectively during and after security incidents.
Legal and Ethical Considerations
Understand legal and regulatory requirements, adhere to ethical standards, and implement privacy principles to ensure compliance.
Risk Management
Identify, assess, and mitigate cybersecurity risks, ensuring compliance with relevant standards and regulations.
Professional Skills
Develop communication, teamwork, critical thinking, and problem-solving skills essential for success in the cybersecurity field.
Geopolitical and Regulatory Aspects
Understand the geopolitical, legal, and regulatory influences on cyber risk management and implement appropriate governance structures.
Cyber Resilience
Assess cyber resilience using industry-standard methodologies, develop incident response strategies, and enhance proactive cyber defense measures.
Security Technologies and Tools
Evaluate and utilize security technologies and tools for testing, monitoring, and securing systems and networks.
Identity and Access Management (IAM)
Implement authentication and authorization mechanisms based on IAM principles to control access effectively.
Secure Architectures
Design and implement secure architectures considering defense in depth and least privilege principles to safeguard systems and networks.
Cryptography and PKI
Apply cryptographic techniques and PKI concepts to secure data, communications, and transactions effectively.
Lecture Panel
The lecture panel for the Professional Certificate in Cyber Security and Risk Management brings together a remarkable blend of practical industry expertise and academic proficiency. With each member boasting over 20 years of experience in information technology, they offer a wealth of specialized skills and knowledge honed through years of hands-on practice in the field. Their diverse backgrounds encompass various sectors within the IT industry, providing students with a comprehensive understanding of real-world challenges and solutions.
Moreover, the inclusion of university lecturers ensures that students benefit from a rigorous academic perspective, grounded in the latest research and theoretical frameworks. This fusion of practical industry insights with scholarly excellence creates a dynamic learning environment where students can explore complex concepts, engage in critical analysis, and develop practical skills essential for success in the cybersecurity and risk management domain.
By tapping into the collective wisdom and expertise of this distinguished panel, students can expect to receive a well-rounded education that equips them with the knowledge, skills, and insights necessary to thrive in today’s dynamic cybersecurity landscape.
Course Outline
Module 1: Cyber Security Principles | |
---|---|
Understanding the CIA triad (confidentiality, integrity, availability) | |
Layered security (defense in depth) |
Module 2: Security Architectures | |
---|---|
Network security | |
Application security | |
Endpoint security | |
Least privilege concept |
Module 3: Security Policies and Procedures | |
---|---|
Developing and implementing security policies | |
Importance of security awareness training |
Module 4: Threat Intelligence in Cyber Security | |
---|---|
Current threat landscape and common threats | |
Key threat actors and motivations | |
Threat intelligence lifecycle |
Module 5: Tools and Techniques in Threat Intelligence | |
---|---|
Threat intelligence tools and platforms | |
Analyzing threat data and indicators of compromise (IoCs) |
Module 6: Cyber Security Testing, Vulnerabilities, and Controls | |
---|---|
Vulnerability assessment and management | |
Penetration testing methodologies and frameworks | |
Implementing security controls |
Module 7: Cyber Security Incident Response | |
---|---|
Developing incident response plans. | |
Phases of incident response. | |
Forensic investigation and evidence handling. | |
Communication and coordination during and after incidents. |
Module 8: Legislation, Ethics, and Privacy in Cyber Security | |
---|---|
Legal framework and compliance requirements | |
Ethical issues and professional conduct | |
Privacy principles and considerations |
Module 9: Cyber Risk Management and Governance (GRC) | |
---|---|
Identifying and assessing cybersecurity risks | |
Governance frameworks (COBIT, ISO/IEC 27001) | |
Compliance and audit processes |
Module 10: Professional Skills and Behaviors for Cyber Security | |
---|---|
Communication skills for technical and non-technical audiences. | |
Team collaboration in cybersecurity operations. | |
Continuous learning and professional development. | |
Critical thinking and problem-solving skills. |
Module 11: Introduction to Cyber Risk Management | |
---|---|
Understanding the geopolitical, legal, and regulatory context of cyber risk | |
Overview of the current cyber threat landscape |
Module 12: Cyber Governance and Risk Assessment | |
---|---|
Cyber governance structures and their importance | |
Conducting a cyber security risk assessment |
Module 13: Cyber Threat Intelligence and Management | |
---|---|
Utilizing cyber threat intelligence effectively | |
Introduction to the cyber security maturity model |
Module 14: Control Frameworks and Standards | |
---|---|
Overview of publicly available control frameworks and standards | |
Implementing control frameworks for cyber security |
Module 15: Integrated Management Systems for Cyber Security | |
---|---|
Developing and implementing an integrated management system for cyber security |
Module 16: Cyber Resilience and Incident Response | |
---|---|
Key aspects of cyber resilience | |
Incident response planning and management |
Module 17: Cyber Incident Management | |
---|---|
Managing a cyber incident effectively | |
Learning from cyber incidents to improve resilience |
Module 18: Cyber Resilience Framework Development | |
---|---|
Developing and implementing a cyber resilience framework |
Module 19: Security Threats, Attacks, and Vulnerabilities | |
---|---|
Introduction to common security threats | |
Understanding various types of cyber attacks | |
Identifying vulnerabilities in systems and networks | |
Case studies and real-world examples |
Module 20: Concepts of Identity and Access Management | |
---|---|
Fundamentals of IAM (Identity and Access Management) | |
Authentication methods and protocols | |
Authorization mechanisms | |
Role-based access control (RBAC) | |
Single Sign-On (SSO) and Multi-Factor Authentication (MFA) |
Module 21: Security Technologies, Tools, and Testing | |
---|---|
Overview of security technologies and tools | |
Penetration testing methodologies | |
Vulnerability scanning and assessment | |
Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS) | |
Security information and event management (SIEM) solutions |
Module 22: Security Operation and Incident Management | |
---|---|
Incident response planning and procedures | |
Incident handling and escalation processes | |
Threat intelligence and analysis | |
Forensic investigation techniques | |
Continuous monitoring and improvement strategies |
Module 23: Security Architecture and Design | |
---|---|
Principles of secure system and network design | |
Secure coding practices | |
Network segmentation and isolation | |
Secure configuration management | |
Secure SDLC (Software Development Life Cycle) |
Module 24: Cryptography and PKI | |
---|---|
Basics of cryptography | |
Symmetric and asymmetric encryption algorithms | |
Public Key Infrastructure (PKI) concepts | |
Digital signatures and certificates | |
Cryptographic protocols (TLS/SSL, IPsec) |
To Whom
This program is designed to equip participants with the necessary skills, knowledge, and practical experience to succeed in the dynamic and evolving field of IT customer support. This course is particularly suited for:
Career Changers
Professionals from non-IT backgrounds who aspire to transition into IT customer support roles.
Recent Graduates
Individuals with degrees in unrelated fields who are looking to enter the IT industry through customer support positions.
IT Professionals
Individuals with a passion for technology and an interest in developing skills specifically in IT customer support.
Professionals Seeking Specialization
Those already working in IT-related roles who wish to specialize further in customer support functions.
Individuals Seeking Career Growth
Those aiming to advance within their current IT customer support career by gaining deeper knowledge and skills.
Job Seekers
Individuals actively seeking employment in the IT sector, particularly in customer support capacities.
Anyone Interested in Virtual Support
Individuals interested in mastering virtual communication and support tools essential for remote customer interaction.
Method of Delivery
Medium of Instruction
Simple English and Sinhala
Evaluation Method
To earn this professional certification, candidates are required to successfully complete a three-part examination process, comprising an assignment, a written examination, and an online practical examination.
Course Duration
Lecture Hours - XX hours
Self Assessments - XX hours
Course Schedule
X Months | X Days per week, 7:30PM - 9:30PM
Course Fee
Per Participant Fee: Rs 45,000/=
Payment Method: Installments | Rs. 15,000/= X 3 installments
- 1st Payment when registering the course
- 2nd Payment one month after the 1st payment
- 3rd payment one month after the 2nd payment
How to Apply
- You Apply
Tell us a little about yourself and we’ll help with the rest. Our convenient online application tool only takes 10 minutes to complete.
- We Connect
After you submit your application, an admissions representative will contact you and will help you to complete the process.
- You Get Ready
Once you’ve completed your application and connected with an admissions representative, you’re ready to create your schedule.
How To Apply
Your Application
Tell us a little about yourself and we’ll help with the rest. Our convenient online application tool only takes 10 minutes to complete.
Our Response
After you submit your application, an admissions representative will contact you and will help you to complete the process.
Your Journey
Once you’ve completed your application and connected with an admissions representative, you’re ready to create your schedule.