Cybersecurity Management

Gain skills in cybersecurity risk management best practices to better protect your company.

The Cybersecurity Management certificate is designed to meet the needs of early- and mid-career professionals who want to set themselves apart with a grounding in cybersecurity risk management best practices. Beyond providing an overview of concepts in a particular area of cybersecurity, the curriculum has been designed to offer in-depth coverage of the three arenas recruiters have told us they want to see in cybersecurity professionals:

  • Cybersecurity Literacy
  • IT Risk Management
  • Global Cybersecurity Law and Policy

Although cybersecurity has been a subject of interest for companies since the late 1990s, increasingly it is an important part of nearly every aspect of business decision-making from due diligence in mergers and acquisitions to supply chain security and enterprise risk management. Managers who understand the multifaceted cyber threat and what they can do to mitigate the risk are at a competitive advantage.

Apply

Course Curriculum

Think about where you are currently in your career, and where you want to be. Then, learn more about the three required courses and choose one additional course as an elective to earn your certificate:

T579: Information Systems Security (3 credit hours)

This course is designed to give students an overview of Information systems security. We will cover the 7 of the 10 domains of knowledge prescribed by (ISC)2 for Information Systems Security Professionals. The course will focus on how IT systems can be secured rather than how they can be compromised.

T560: IT Risk Management (3 credit hours)

This class covers technology and how to leverage a company’s investment in its technology to achieve its business and IT strategy. We will do this by (1) analyzing the value that IT delivers, (2) the risks that IT manages and (3) the cost of providing service to the business.

T578: Cybersecurity Law and Policy (3 credit hours) 

Recent cyber-attacks have highlighted the importance of cybersecurity. Organizations need professionals at all levels—not just in the IT department—who understand the technical, legal and business aspects of cybersecurity risk management, as well as how to safeguard privacy and intellectual property. This new course takes an interdisciplinary, global approach to introduce students to cybersecurity risk management. Course content includes U.S., comparative, and international law related to managing cyber-attacks along with connected hot topics such as Internet governance, blockchain, Internet of Things, privacy, and cybersecurity codes of conduct. The primary aim of the course is to provide students with a basic working knowledge of cybersecurity law and policy, focusing on the United States but put in a global perspective.

C522: Information Technology (3 credit hours)

Study of information systems management issues including skill and talent management; IT costs, budgets, value, and chargeback systems; priority setting and financial justification of IT investments; project management; runaway projects and underperforming vendors; security risks and crises; emerging technology policies; communications with other senior executives; vendor management; infrastructure standardization; support for innovation; and risk management.


C533: Data Warehousing, Data Mining, and Visualization (3 credit hours)

Understand and utilize unsupervised models including principal components analysis, cluster analysis, and market basket analysis. Understand business intelligence-related concepts:

  • The notion of corporate information factory, 
  • Dashboards and scorecards that support the businesses, 
  • Different types of problems related to data quality including a methodology for maintaining data quality, and 
  • An overview of a variety of software tools that are employed in the development of a data warehouse: ETL (extraction, transformation, and loading) and analytic tools.

Recognize some of the key issues for managerial considerations:

  • The tools of metrics in decision-making, 
  • Types of business risks along with how to alleviate the risks associated with implementing informational systems, and 
  • Issues related to data governance. 

C548: Managing Intellectual Property in a Global Environment (3 credit hours)

When businesses unwisely share their core technology, they risk losing it. Despite this fact, there currently is no single regulatory scheme that provides international protection for proprietary information. Further, while most countries offer some degree of legal protection for creative products, processes and services, the rigor of this protection varies throughout the world. This course is designed to acquaint global business managers with the legal and practical issues involved in the protection of intellectual property. It introduces students to the basic types of intellectual property (patents, copyrights, trademarks and trade secrets) and the key differences in how they are protected around the world. Ultimately, upon completion of this course, students will better understand how to protect their company’s intellectual property when doing business in the global environment.

Application Instructions

Fill out the online application first.

After you complete the Kelley application, you’ll receive an email with instructions on how to apply through the Graduate CAS Application. During this Part 2 application, you will upload the following materials to complete your application.

  • Resume—Provide a copy of your resume, summarizing your professional experiences and accomplishments.
  • Personal Statement—Tell us what you want to achieve in this program in 500 words or less.
  • Letter of Recommendation—Ask someone who knows your professional career to write a letter of recommendation for you. Provide the contact information of your recommender within the application. An email prompt will be sent to their email address, and they will be able to fill out a form and upload additional material. If you need alternative arrangements, please contact edp@@indiana.edu.
  • Post-Secondary Transcripts—Provide copies of your transcripts from all of the post-secondary institutions you’ve attended. These copies can be sent to the program manager, or uploaded into the Part 2 Application.

Questions? Contact us.

Our Admissions Team is here to help you navigate the admissions process. Contact EDP@indiana.edu directly to start the conversation.

Structure and Credits

Indiana University has been a leader in cybersecurity research and education for more than 20 years and is today a world-leading research institution in the creation and dissemination of cybersecurity best practices that are in-demand by both the public and private sectors. With its status as a NSA/DHS certified Center of Academic Excellence (CAE) in both Information Assurance Research and Information Assurance Education, the university is home to nationally ranked, cutting-edge cybersecurity research and educational programs in the fields, for example, of cryptography, systems security, enterprise risk management, and cybersecurity law and policy.

Your Cybersecurity Management Certificate will:

  • Total 12 credit hours
  • Be completed over 6 to 12 months
  • Be completed fully online
  • Not require GMAT/GRE scores

A bachelor's degree is required. No prior training in technology, business, or law is required.

Transfer your certificate credits to an online degree program. 

Earning a professional certificate is a low-risk way for you to explore a field of business, and decide if you want to continue developing your expertise in that area.

It is easy for you to earn an MS online. Simply apply your certificate credits to your degree requirements.

In particular, students who complete courses in the Cybersecurity Management Certificate program can transfer those credits toward the MS in Cybersecurity Risk Management.

 Please contact cyberinq@indiana.edu for more information on how to transfer.