Business Cybersecurity
Certificate Program

AN IN-DEPTH LOOK AT DEVELOPING AND IMPLEMENTING A CYBERSECURITY FRAMEWORK FOR YOU OR YOUR COMPANY.

Need To Know

Contact Jan Jones (jjones@culverhouse.ua.edu) for more information.

OVERVIEW

Build organizations resilient to cyberattacks by learning about technical best practices and procedures from renowned researchers

Earn 22 hours of CPE for CPAs. Designed for:
  • IT Administrators
  • Executives
  • Data Practitioners
  • Or anyone technical or non-technical who wants to understand or mitigate cyber threats
Registrants will:
  • Understand problems cybersecurity professionals face from both inside and outside of an organization
  • Learn how to respond to attacks and build a resilient culture of cybersecurity
  • Learn to speak the language of cybersecurity professionals allowing informed conversations with cybersecurity teams and colleagues
  • Reinforce traits to become leaders as a cybersecurity officer
Topics covered:
  • Understanding cybersecurity problems and the profession
  • Developing and maintaining a cybersecurity program
  • Creating an attack response
  • Securing the cloud
  • Fortifying the weakest link
  • Developing a cyber culture
Format: The certificate program is online with a duration of six weeks.  Modules are self-paced with virtual wrap-up sessions on Friday mornings.

This certificate is not eligible for federal financial aid. No academic credit will be awarded.

INSTRUCTORS

Matthew Hudnall

Associate Director of the Institute of Business Analytics
View Full Profile

Greg Bott

Assistant Professor of Cybersecurity
View Full Profile

Allen Johnston

Professor of MIS
View Full Profile

6 MODULES

  • Topic 1: The current threat landscape
  • Topic 2: Advanced threats and concerns
  • Topic 3: The cybersecurity profession
  • Topic 1: Planning and governance
  • Topic 2: Roles and responsibilities
  • Topic 3: Cyber infrastructure preparation
    • Topic 3a: Protective technologies and continuous monitoring
  • Topic1: Threat detection and amelioration
  • Topic 2: Scope, mitigation, and reporting
  • Topic 3: Remediation
  • Topic 4: Communicating
  • Topic 5: Ransomware Readiness
  • Topic 1: What is the cloud?
  • Topic 2: Cloud cost and benefits
  • Topic 3: Cloud security
  • Topic 1: The insider threat
  • Topic 2: SETA employee engagements
  • Topic 3: Best practices and early warnings
  • Topic 1: Frameworks and models
  • Topic 2: Leadership and the CISO
  • Topic 3: Best practices

LEarn About Our Other
Certificate PRograms

X