The Cybersecurity Governance Certificate is composed of four three-credit hour courses. The four courses will be delivered in an eight-week format. The four courses will be delivered in an online modality.
Prerequisite requirements will be adjusted based on the type of student:
- For current students pursuing a master of library and information science degree, a master of science in information management degree, or a master in business administration degree, prereqs will not be changed.
- For students in the post-baccalaureate certificate program, the prereqs need to be changed for all courses. IM 780, IM 783, or IM 785 will be the prereq for all subsequent courses.
- For returning students with a master’s degree, IM 780. IM 7803, or IM 785 will be the prereq for all subsequent courses.
- For Concordia students, IM 780 will have no prereqs.
Cybersecurity Core Courses
IM 780 Introduction to Information Security
Ensuring that data and information are secure is a complex process. In this introductory course, students will learn about the various components that encompass information security including cyber security threats, counter-attack, and defense services. Students will explore the multiple levels of security in a variety of technologies and applications spaces. Prerequisite: IM 701
IM 783 Organizational Information Security
Most organizations exist in a network environment in which data is collected, maintained and shared. This course focuses on the information and data security policy and strategy issues facing various organizations including government/public, private, business, non-profit, education, health, and others. This course will explore pro-active defense and "ethical hacking" within the contexts of specific organizations. Prerequisite: IM 701
IM 785 Information Privacy
Data privacy law in the US is piecemeal; a number of different laws regulate the dissemination of information to third parties. Some laws govern information about children, some about health information, some about financial records, some about personally identifying information. These laws are enacted in organizational policies and in eventually encoded in software. This course will examine the legal, social, and policy issues surrounding information privacy. Prerequisite: IM 701
IM 787 Cybersecurity Governance
Organizations need to secure their information from persistent, global threats. Effective information security at the organizational level requires participation, planning, and practice. It is an ongoing effort that requires management and staff to work together. This course will provide students with the skills and knowledge to facilitate innovative cybersecurity governance, leadership, and management to develop information security strategies that support the organizational goals and objectives, that are aligned with applicable legal and regulatory requirements, that are ethical and sustainable, and that are implemented through policies and internal controls by providing oversight for risks mitigation.