Skip to main content
Thumbnail

Cybersecurity Risk Management Certificate

Demand for Cybersecurity Experts Growing

Cybersecurity has become a priority for almost every organization as the proliferation of data makes information more vulnerable to online hacks. According to Security magazine, there were an estimated 2 million cyberattacks in 2018, resulting in over $45 billion in losses.

According to Burning Glass Technologies, the world’s leading real-time labor market data source, the number of cybersecurity jobs is expected to grow 30% by 2023 with an average salary of $96,000.

Expand Your Opportunities

cybersecurity professional
Whether you are interested in moving into Cybersecurity or you are an IT expert who needs exposure to the Information Security field, Bentley's certificate will provide you with the cross-disciplinary foundation to any number of professional certifications, including those from CompTIA, ISACA, Cloud Security Alliance, and (ISC)2.

Upon completion of this certificate, should you apply for and be accepted to a Bentley Master’s program, certificate courses are stackable towards both MBA and MSBA degrees as long as a minimum 3.0 GPA is achieved.

Required Courses

CS 607 Cybersecurity

This course provides a technical focus on information, computer and network security, which together form the basis for securing enterprise systems and services. It introduces what cybersecurity means, both in the abstract and in the context of business information systems. Students learn relevant cybersecurity issues, technologies and approaches found in the contemporary enterprise. Students recognize and understand threats to privacy, confidentiality, integrity and service availability as well as best practices to defend both digital and physical assets against such threats.

 

IPM 723 Information Security, Controls and Ethics

This course presents an overview of information security issues that must be addressed by organizations in today's ubiquitously networked environments. Specific coverage will include information security risks and related protection of data, networks and application software. While the primary focus is on how to protect organizational information assets, other topics will include strategic uses of security in business, the impact of security risk on various industries, as well as the security and privacy rights and responsibilities of end users and home computer operators. The course is designed to help students think critically about the local, national and global information security issues in our highly networked society.8u6

 

Elective Course

Students have the option to take either CS 610 or AC 730 as part of their three course requirements.

CS 610 Enterprise Architecture

This course explores the design, selection, implementation and management of enterprise IT solutions. The focus is on applications and infrastructure and their fit with the business. Students learn frameworks and strategies for infrastructure management, system administration, content management, distributed computing, middleware, legacy system integration, system consolidation, software selection, total cost of ownership calculation, IT investment analysis, and emerging technologies. These topics are addressed both within and beyond the organization, with attention paid to managing risk and security within audit and compliance standards. Students also read current vendor and analyst publications and hone their ability to communicate technology architecture strategies concisely to a general business audience.

 

AC 730 Business Processes and Systems Assessment

This course examines typical organizational business processes and the information technology that enables those processes. It reviews qualities of information, including those established by authoritative bodies, to assess the ability of information systems to support the business processes and an organization's management. The course focuses on financial and accounting information systems (AIS) and explores several typical AIS application areas. Issues addressed include the effect of emerging technologies on business processes and their related information systems; control issues pertaining to these systems; and the implications of technology-enabled organizational changes on systems design, implementation and management. Students will be introduced to state-of-the-art tools and techniques for examining business processes and information systems and will engage in a project at a company site.

 

Loading...