Students in this program will be prepared for ‘Oversee and Govern’ and ‘Protect and Defend’ jobs within the government’s NICE Cybersecurity Workforce Framework. As such, students will learn to effectively manage cybersecurity for businesses: they’ll understand the risks associated with different network designs, maintain compliance to laws and regulations governing the space, develop strategies to mitigate risks within companies, and manage crises under pressure to ensure fast and comprehensive recoveries.
All Rize MBA Specialization Programs, including Cybersecurity, are designed to be taken in any order as to create maximum flexibility when it comes to adoption. These courses do not stack. Depending on your MBA program requirements, all students must complete the 3-4 courses below.
Companies storing information are responsible for keeping it safe—and face consequences if they don’t. Who's at fault after an attack and who must be informed? This course covers corporate governance principles, risk identification methods, business regulations, accountability, and audits. In a data-driven world, business leaders must handle data responsibly, and by the end of this course, you'll learn how to manage the growing legal obligations around cybersecurity.
In order to ensure a house is safe, we need to know how it’s built. It’s the same for cybersecurity: to ensure systems are secure, we need to understand their design and the unique security challenges of different network architectures and data storage solutions. By the end of this course, you’ll be able to critique security for various network designs, including IT and OT systems, cloud environments, data storage, and IoT networks, in terms of cyber risk.
Cyberattacks today are inevitable—but the extent of the damage may rely on how much you, as the manager, are prepared. By the end of this course, you’ll know how to create risk management strategies before, during, and after cyberattacks, developing incident response plans, understanding frameworks like NIST and MITRE ATT&CK, identifying proactive and reactive protection techniques, and debriefing with 'hotwashes.'
To defend against hackers, you need to think like a hacker. This course covers the fundamentals of ethical hacking, from Linux commands and open-source tools to attack tree construction and vulnerability research. By the end of the course, you'll be able to use what you’ve learned to analyze, interpret, and communicate penetration tests and security strategies to decision-makers and executives.