Two people stand together in front of computer servers while reviewing a tablet screen

Cyber Governance and Risk Management Certificate

When it comes to cyber governance and risk management, attack and defense are two sides of the same coin. The Cyber Governance and Risk Management certificate equips you with the successful strategies you need to protect assets in the new, multidimensional cyber environment.

Certificate Overview

Explore the motivations, assets and capabilities of cyber attackers to learn how to organize and defend against similar threats through the Cyber Tech Academy’s Cyber Governance and Risk Management certificate.

Through real-world case studies involving breaches like SolarWinds and the Colonial Pipeline, you’ll develop an agile understanding of cyber threats and the problem-solving frameworks needed to protect against similar attacks on the national and international level.

100% Online
Estimated Time to Complete
14 Weeks
Total Tuition

Career Projections

Projected employment growth for information security analysts by 2030 (U.S. Bureau of Labor Statistics, 2021)
Average base salary for cyber security professionals (Payscale, 2022)
Projected number of unfilled cyber security jobs globally by 2025 (Cybersecurity Ventures, 2021)
An office space filled with a variety of employees working on computers

Certificate Outcomes

Using teachings from noted military strategist and philosopher Sun Tzu as a guide, your Cyber Governance and Security certificate will prepare you to:

  • Develop theoretical and practical knowledge so that you can apply course takeaways in real-time, without needing to retrain tomorrow

  • Implement cyber security into existing governance, risk management and compliance programs (GRCs), and create GRCs from scratch

  • Evaluate and communicate the historical relationships between technology, human productivity and business

  • Examine the ebb and flow of cyber attack and defense strategies

  • Assess and respond to the global multidimensional environment of cyber, kinetic, economic and diplomatic threats

  • Identify the broader scope of data like Intellectual Property (IP), DNA and operational data

  • Formulate security and governance frameworks and standards on both a national and international level

Explore Our Other Certificates

A laptop screen with a password field containing asterisks.

Cloud Security and Governance

A medical chart with a lock indicating a secure medical file.

Cyber Security in Healthcare

A globe with a padlock indicating encrypted geo-tagging data.

Securing the Nation and Enterprises with Artificial Intelligence

Request Information