Enrollment options

Overview:

The world is undergoing significant digital‐transformations, drastically changing the way we conduct business and carry out daily transactions. Cybersecurity assures the proper operation of everything from financial transactions to power generation, affects every size and scale of business, government, and everyday lives. It has become increasingly critical in the cyber-age.

Cyber-attacks can be extremely expensive, and cost lives, fortunes, and the future of nations.
Attacks are getting more sophisticated, more frequent, and reaching more people around the world.
That makes it important for you and everyone else to become aware of the effects of cybersecurity issues.

This certificate program covers the basics and dimensions of cybersecurity, along with case studies and global perspectives from the world-class experts in the field.

COURSE CURRICULUM:

Module-1: Basics of Cybersecurity: 

  • Basic issues & implications
  • What to do about them?
  • How the business works, Duty to protect
  • Risk-management, Security-management
  • Control-architecture, and Technical security-architecture
  • Decision-Process
  • Cyber-Lab Sample
  • Quiz

Module-2: Dimensions of Cybersecurity:

  • Critical-Infrastructure
  • IT Versus OT
  • Management Versus Technology
  • Quiz

Module-3: Vertical Drill-downs, Case-studies:

  • Medical-Healthcare Case Study
  • Water Case Study
  • City-power and Tribal-investments case-study
  • City Government Case Study
  • Banking & Financial Services
  • Cyber Board Game Startup Case Study
  • Quiz

Module-4: Global Perspectives from Guest lecturers:

  • Chris Blask: Organizing-Cybersecurity
  • Dr. Jennifer Bayuk: Risk-Analysis
  • Prof. Lucina Duranti: Records Management
  • Quiz

PROGRAM DELIVERY:

  • Online remote with automated and semi-automated assistance
  • Lectures via video from a cloud LMS platform
  • Live Laboratory examples and experiments from the Cyber Labs
  • Exams live online remote
  • Total of around 45-60 hours, over 8 weeks (Can change depending on your background, schedule, etc.)

OUTCOME / BENEFITS:

  • Learn from a world‐class expert instructor, who first coined the term “computer virus” and invented the virus defense techniques, who is an (ISC)² Fellow with over 40 years of experience in the cybersecurity industry and academia
  • Receive a Certificate upon successfully completing the course
  • Hands‐on‐experience: Access iZen’s Innovation Lab during the course. Use lab exercises to reinforce the understanding of concepts. Learn from real-life use‐cases

INSTRUCTOR: Dr. Fred Cohen

Dr. Fred Cohen

Dr. Fred Cohen has 40+ years of experience building companies and supporting risk management and strategic decision making for enterprises of all sizes and sorts. He is globally recognized as an innovative expert in information protection and cybersecurity. He is one of the only 20 Cybersecurity experts in the world, recognized as a fellow of (ISC)² at “Cybersecurity and IT Security Certifications and Training”. Dr. Cohen works closely with global experts to help bring knowledge of all things Cyber to program attendees from around the World

Dr. Cohen has a long history of being ahead of the curve. Following are some of the highlights of his accomplishments:

  • First defined the term "Computer Virus" and invented most of the widely used computer virus defense techniques
  • Won several international awards for his work in Cybersecurity
  • Led the team that defined the information assurance problem as it relates to Critical-Infrastructure Protection
  • Did seminal researcher in the use of deception for information protection

  • His "Deception for Protection" series of papers is widely cited, and the techniques he pioneered are now in global use
  • A leader in advancing the science of digital forensic evidence examination
  • Top-flight information protection consultant and industry analyst for many years
  • Authored more than 200 invited, refereed, and other scientific and management research articles
  • Wrote monthly articles on cyber since 1995 and wrote several books on information protection
  • His "Enterprise Information Protection Architecture", "Challenges to Digital Forensic Evidence", and "Digital Forensic Evidence Examination" are used in graduate classes and other venues  worldwide
  • Leading security practitioners around the globe have used his "Chief Information Security Officers ToolKit" series of books and booklets
  • His "Frauds Spies and Lies and How to Defeat Them" book has been the subject of radio talk shows
  • The research community has widely used his series of "Infosec Baseline" studies as stepping off points for further research
  • His "50 Ways" series is very popular among practitioners looking for issues to be addressed
  • His "World War 3 ... Information Warfare Basics" is highly regarded among the thinkers in this arena
  • Founded the College Cyber Defenders program at Sandia National Laboratories that ultimately led to the formation of the CyberCorps program
  • Taught and testified on issues of digital forensics as an admitted expert in local, State, Federal, and other courts in criminal and civil matters
  • Was named the "most famous hacker" of all time by ABC news in 2009

Dr. Cohen has a Ph.D. in Electrical Engineering (University of Southern California), MS in Information Sciences (University of Pittsburgh), and a BS in Electrical Engineering (Carnegie‐Mellon University).

Guests cannot access this course. Please log in.