Professional Certificate in Cyber Security and Risk Management

A Professional Certificate in Cyber Security and Risk Management is a formal educational program aimed at equipping individuals with advanced knowledge and practical skills in cybersecurity and risk management. The program is designed to address the growing need for skilled professionals who can protect organizations from cyber threats and manage risks effectively.

Course Description

The Professional Certificate in Cyber Security and Risk Management is designed to equip participants with the essential knowledge and skills needed to protect information assets, manage risks, and ensure data integrity in today’s digital landscape. This comprehensive program blends theoretical foundations with practical applications, preparing individuals for advanced roles in cybersecurity and risk management.

Core Principles

Grasp the fundamentals of cybersecurity, including confidentiality, integrity, and availability, and implement layered security measures to protect systems and data.

Describe various security architectures and apply the principle of least privilege to ensure that users have only the necessary access rights.

Develop, implement, and enforce security policies and procedures to establish a secure operational environment.

Analyze the current threat landscape, identify threat actors, and utilize threat intelligence to inform security decisions and strategies.

Conduct vulnerability assessments and penetration tests, and implement security controls to mitigate risks effectively.

Develop and implement incident response plans, conduct forensic investigations, and communicate effectively during and after security incidents.

Understand legal and regulatory requirements, adhere to ethical standards, and implement privacy principles to ensure compliance.

Identify, assess, and mitigate cybersecurity risks, ensuring compliance with relevant standards and regulations.

Develop communication, teamwork, critical thinking, and problem-solving skills essential for success in the cybersecurity field.

Understand the geopolitical, legal, and regulatory influences on cyber risk management and implement appropriate governance structures.

Assess cyber resilience using industry-standard methodologies, develop incident response strategies, and enhance proactive cyber defense measures.

Evaluate and utilize security technologies and tools for testing, monitoring, and securing systems and networks.

Implement authentication and authorization mechanisms based on IAM principles to control access effectively.

Design and implement secure architectures considering defense in depth and least privilege principles to safeguard systems and networks.

Apply cryptographic techniques and PKI concepts to secure data, communications, and transactions effectively.

The lecture panel for the Professional Certificate in Cyber Security and Risk Management brings together a remarkable blend of practical industry expertise and academic proficiency. With each member boasting over 20 years of experience in information technology, they offer a wealth of specialized skills and knowledge honed through years of hands-on practice in the field. Their diverse backgrounds encompass various sectors within the IT industry, providing students with a comprehensive understanding of real-world challenges and solutions.

Moreover, the inclusion of university lecturers ensures that students benefit from a rigorous academic perspective, grounded in the latest research and theoretical frameworks. This fusion of practical industry insights with scholarly excellence creates a dynamic learning environment where students can explore complex concepts, engage in critical analysis, and develop practical skills essential for success in the cybersecurity and risk management domain.

By tapping into the collective wisdom and expertise of this distinguished panel, students can expect to receive a well-rounded education that equips them with the knowledge, skills, and insights necessary to thrive in today’s dynamic cybersecurity landscape.

Module 1: Cyber Security Principles
Understanding the CIA triad (confidentiality, integrity, availability)
Layered security (defense in depth)
Module 2: Security Architectures
Network security
Application security
Endpoint security
Least privilege concept
Module 3: Security Policies and Procedures 

Developing and implementing security policies

 
Importance of security awareness training 
Module 4: Threat Intelligence in Cyber Security
Current threat landscape and common threats
Key threat actors and motivations
Threat intelligence lifecycle
Module 5: Tools and Techniques in Threat Intelligence
Threat intelligence tools and platforms
Analyzing threat data and indicators of compromise (IoCs)
Module 6: Cyber Security Testing, Vulnerabilities, and Controls 
Vulnerability assessment and management 
Penetration testing methodologies and frameworks 
Implementing security controls 
Module 7: Cyber Security Incident Response
Developing incident response plans.
Phases of incident response.
Forensic investigation and evidence handling.
Communication and coordination during and after incidents.
Module 8: Legislation, Ethics, and Privacy in Cyber Security
Legal framework and compliance requirements
Ethical issues and professional conduct
Privacy principles and considerations
Module 9: Cyber Risk Management and Governance (GRC) 
Identifying and assessing cybersecurity risks 
Governance frameworks (COBIT, ISO/IEC 27001) 
Compliance and audit processes 
Module 10: Professional Skills and Behaviors for Cyber Security 
Communication skills for technical and non-technical audiences. 
Team collaboration in cybersecurity operations. 
Continuous learning and professional development. 
Critical thinking and problem-solving skills. 
Module 11: Introduction to Cyber Risk Management
Understanding the geopolitical, legal, and regulatory context of cyber risk
Overview of the current cyber threat landscape
Module 12: Cyber Governance and Risk Assessment 
Cyber governance structures and their importance 
Conducting a cyber security risk assessment 
Module 13: Cyber Threat Intelligence and Management 
Utilizing cyber threat intelligence effectively 
Introduction to the cyber security maturity model 
Module 14: Control Frameworks and Standards 
Overview of publicly available control frameworks and standards 
Implementing control frameworks for cyber security 
Module 15: Integrated Management Systems for Cyber Security
Developing and implementing an integrated management system for cyber security
Module 16: Cyber Resilience and Incident Response 
Key aspects of cyber resilience 
Incident response planning and management 
Module 17: Cyber Incident Management 
Managing a cyber incident effectively 
Learning from cyber incidents to improve resilience 
Module 18: Cyber Resilience Framework Development
Developing and implementing a cyber resilience framework
Module 19: Security Threats, Attacks, and Vulnerabilities 
Introduction to common security threats 
Understanding various types of cyber attacks 
Identifying vulnerabilities in systems and networks 
Case studies and real-world examples 
Module 20: Concepts of Identity and Access Management 
Fundamentals of IAM (Identity and Access Management) 
Authentication methods and protocols 
Authorization mechanisms 
Role-based access control (RBAC) 
Single Sign-On (SSO) and Multi-Factor Authentication (MFA) 
Module 21: Security Technologies, Tools, and Testing 
Overview of security technologies and tools 
Penetration testing methodologies 
Vulnerability scanning and assessment 
Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS) 
Security information and event management (SIEM) solutions 
Module 22: Security Operation and Incident Management 
Incident response planning and procedures 
Incident handling and escalation processes 
Threat intelligence and analysis 
Forensic investigation techniques 
Continuous monitoring and improvement strategies 
Module 23: Security Architecture and Design 
Principles of secure system and network design 
Secure coding practices 
Network segmentation and isolation 
Secure configuration management 
Secure SDLC (Software Development Life Cycle) 
Module 24: Cryptography and PKI 
Basics of cryptography 
Symmetric and asymmetric encryption algorithms 
Public Key Infrastructure (PKI) concepts 
Digital signatures and certificates 
Cryptographic protocols (TLS/SSL, IPsec) 

This program is designed to equip participants with the necessary skills, knowledge, and practical experience to succeed in the dynamic and evolving field of IT customer support. This course is particularly suited for:

Career Changers

Professionals from non-IT backgrounds who aspire to transition into IT customer support roles.

Recent Graduates

Individuals with degrees in unrelated fields who are looking to enter the IT industry through customer support positions.

IT Professionals

Individuals with a passion for technology and an interest in developing skills specifically in IT customer support.

Professionals Seeking Specialization

Those already working in IT-related roles who wish to specialize further in customer support functions.

Individuals Seeking Career Growth

Those aiming to advance within their current IT customer support career by gaining deeper knowledge and skills.

Job Seekers

Individuals actively seeking employment in the IT sector, particularly in customer support capacities.

Anyone Interested in Virtual Support

Individuals interested in mastering virtual communication and support tools essential for remote customer interaction.

The delivery method for this certification is entirely online, requiring candidates to have access to a personal computer.

Simple English and Sinhala 

To earn this professional certification, candidates are required to successfully complete a three-part examination process, comprising an assignment, a written examination, and an online practical examination.

Lecture Hours - XX hours
Self Assessments - XX hours
X Months | X Days per week, 7:30PM - 9:30PM
Per Participant Fee: Rs 45,000/= 
Payment Method: Installments | Rs. 15,000/= X 3 installments 

  • 1st Payment when registering the course
  • 2nd Payment one month after the 1st payment
  • 3rd payment  one month after the 2nd payment

How to Apply

Tell us a little about yourself and we’ll help with the rest. Our convenient online application tool only takes 10 minutes to complete.

After you submit your application, an admissions representative will contact you and will help you to complete the process.

Once you’ve completed your application and connected with an admissions representative, you’re ready to create your schedule.

How To Apply

Your Application

Tell us a little about yourself and we’ll help with the rest. Our convenient online application tool only takes 10 minutes to complete.

Our Response

After you submit your application, an admissions representative will contact you and will help you to complete the process.

Your Journey

Once you’ve completed your application and connected with an admissions representative, you’re ready to create your schedule.

FORM

Are you ready to take the next step toward your future career?