Cyber Governance and Risk Management Certificate
When it comes to cyber governance and risk management, attack and defense are two sides of the same coin. The Cyber Governance and Risk Management certificate equips you with the successful strategies you need to protect assets in the new, multidimensional cyber environment.
EnrollCertificate Overview
Explore the motivations, assets and capabilities of cyber attackers to learn how to organize and defend against similar threats through the Cyber Tech Academy’s Cyber Governance and Risk Management certificate.
Through real-world case studies involving breaches like SolarWinds and the Colonial Pipeline, you’ll develop an agile understanding of cyber threats and the problem-solving frameworks needed to protect against similar attacks on the national and international level.
EnrollModality
100% Online
Estimated Time to Complete
14 Weeks*
*Students have up to one year to complete the certificate from the time of registration.
Tuition: $5,000 with a 10% discount if you pay in full
Instructor
Career Projections
33
PERCENT
Projected employment growth for information security analysts by 2030 (U.S. Bureau of Labor Statistics, 2021)
$76,877
AVERAGE BASE SALARY
For cyber security professionals (Payscale, 2022)
3.5
MILLION
Projected number of unfilled cyber security jobs globally by 2025 (Cybersecurity Ventures, 2021)
Certificate Outcomes
Using teachings from noted military strategist and philosopher Sun Tzu as a guide, your Cyber Governance and Security certificate will prepare you to:
- Develop theoretical and practical knowledge so that you can apply course takeaways in real-time, without needing to retrain tomorrow.
- Implement cyber security into existing governance, risk management and compliance programs (GRCs), and create GRCs from scratch.
- Evaluate and communicate the historical relationships between technology, human productivity and business.
- Examine the ebb and flow of cyber attack and defense strategies.
- Assess and respond to the global multidimensional environment of cyber, kinetic, economic and diplomatic threats.
- Identify the broader scope of data like Intellectual Property (IP), DNA and operational data.
- Formulate security and governance frameworks and standards on both a national and international level.