Information and Cybersecurity Management
The comprehensive academic program dedicated to the management of cybersecurity of companies
Information and Cybersecurity Management
Program Overview
The Micromaster’s program is dedicated to the development and management of projects to protect companies in cyberspace. Over 9 weeks, we will cover all the fundamentals of cybersecurity: from basic cyberthreats to implementing security scenarios at a strategic level. We will learn to analyze and forecast risks and build a strategy for protecting the sensitive data of companies and users, considering markets of Ukraine, the USA and Europe.
The program will be most relevant for top management, team leads and heads of engineering and product teams. At the end of the program, participants will take a complex test and work on a course project.
What you will learn
SET Grants — scholarships for Micromasters program
SET University has launched scholarships that cover 70% of the cost of studying for a Micromaster's program in cybersecurity. The scholarships are aimed at supporting women aspiring to develop in IT, military personnel, and combat veterans.
To participate, you need to
- prepare a motivation letter
- fill out the application form
- pass a technical test for basic competencies
Submission deadline: January 11
Program Units
Module 1. Fundamentals of Cyber Security
Learn cybersecurity fundamentals, including how to detect threats, protect systems and networks, and anticipate potential cyber attacks.
Topics Include- Submodule 1 — Computing Security Concepts and Problems
- Submodule 2 — Cryptography and PKI, trusted services
- Submodule 3 — Networking and communication
- Submodule 4 — Systems Hardening
- Submodule 5 — BCP, IRP, DRP
Module 2. Global project management
Global project management framework requests from leaders, the trifecta of skillsets: leadership, strategic business management, and technical project management.
Topics Include- Submodule 1 — Technical Project management
- Submodule 2 — Cybersecurity Leadership Essentials
- Submodule 3 — Business management
Module 3. Cybersecurity Risk Management
Learn key principles of risk analysis, risk assessment, and risk mitigation for information security using both qualitative and quantitative methodologies.
Topics Include- Submodule 1 — Introduction to cybersecurity risk management
- Submodule 2 — Cybersecurity Risk Management Process
- Submodule 3 — Standards and Frameworks for Cyber Risk Management Approach
Module 4. Supply chain security management
Supply chain security is the part of supply chain management that focuses on the risk management of external suppliers, vendors, logistics, and transportation. The learning objective of the module is to provide knowledge and skills for identifying, analyzing, and mitigating the risks inherent in working with other organizations as part of a supply chain.
Topics Include- Submodule 1 — Supply chain and third party services
- Submodule 2 — Threats and supply chain security
- Submodule 3 — Best practices & frameworks
Module 5. Security Governance, Ethics, and the Legal Environment
The module aims to provide data, insights, and recommendations on non-technical aspects of cybersecurity. It helps to address ethical and legal challenges in securing the digital infrastructure.
Topics Include- Submodule 1 — International and local legislation in cybersecurity
- Submodule 2 — Cybersecurity Governance
- Submodule 3 — Ethics, privacy and human rights in cybersecurity
Module 6. Capstone Written Project
MicroMasters program capstone experience for verified learners entails practical demonstration of these skills.
MENTORS AND TUTORS
Oleksii Baranovskyi
Nick Gicinto
Former American CIA Officer, ex-Tesla, ex-Uber.
Nick Gicinto is an executive security leader and veteran of the Central Intelligence Agency (CIA). After transitioning to the private sector, Nick was instrumental in establishing insider threat and intelligence programs at both Tesla and Uber. He also assumed the role of Vice President at RiskIQ, which has since become a part of Microsoft. Subsequently, Nick played a crucial role in helping Chainlink Labs, a prominent blockchain company, establish its security intelligence program. In addition to his corporate endeavors, Nick serves as CISO and Professor of Practice in Cybersecurity at the William Jewell College and Adjunct Professor at SET University.
Benefits
The comprehensive practical program focused on working with real-world cases
Adaptive online learning — can be combined even with full-time job
Work in groups with constant feedback from lecturers
Feedback from first-year students
Yulia Demchenko
Even before starting my micro master’s program, I researched the implementation of SOC and CERT in the State Border Guard Service, using Poland as an example. This research allowed me to understand the basic concepts in the field: how cyber threat response centres are created, the basic algorithms for responding to risks, etc. But I lacked the opportunity to communicate with IT professionals and practical training. The micro master’s program at SET University solved my problem.
The webinars, in addition to theoretical knowledge that could be consolidated on the platform, provided practical skills from industry experts. I am still sorting out the knowledge I have gained, as the amount of information on the program is very large.
Now, thanks to the program, I am finalizing a document with recommendations for creating a cyber threat response center at the State Border Guard Service. We are deepening our cooperation with the EU and need to implement their security standards in law enforcement.
Dmytro Akhtyrsky
I am the director of the IT department at the State Agency of Water Resources of Ukraine. Before that I worked at Huawei as a business development manager, where I was responsible for data processing and everything related to their infrastructure.
It was important for me to learn more about building cybersecurity teams because it is different from building an IT team that deals with infrastructure or general services. This is a great experience and great knowledge.
For whom
CTO, Team Leads of engineering teams
Project Managers, Product Owners, Business Analysts, Product and Delivery Managers
C-Level management, startup founders
DevOps and DevSecOps
Frequently Asked Questions
Who is eligible to apply for the MicroMasters program?
The Cybersecurity MicroMasters program is intended for those who have completed a STEM Bachelor’s degree or have a minimum of two years of work experience in a technical environment.
Note: coding experience ISN’T NECESSARY for this program.
Is it necessary to have coding skills to study at this program?
No, programming skills are not required for this program.
What is a MicroMaster's program?
A MicroMaster’s program is a mid-term program (micro-credentials program) that includes several modules from the main master’s program. In addition, graduates receive ECTS credits for completing these modules, which can be used to transfer to a master’s program later.
What format will the classes be held in?
The program consists of online lectures and hands-on webinars with the subject matter expert. Within each module, students also undergo progressive testing, and at the end of the program, they present a final project demonstrating the acquired skills.
Can ECTS credits earned through this MicroMasters program be considered towards a Master's program in Cybersecurity?
Yes, learners who complete all six educational modules successfully (with 80%+ acceptance rate) and are accepted into the Master’s program may transfer credits.
Does the MicroMasters Certificate guarantee a job interview after completing the program?
Obtaining a MicroMasters Program certificate will give you the tools to stand out in the industry. But the certificate itself does not guarantee a job interview or a job. However, you can share your certificate on your LinkedIn page and resume to demonstrate your achievements and highlight the knowledge acquired.
Partners
Learn more about the SET University program
Questions left?
Get a consultation: hello@setuniversity.tech