Information and Cybersecurity Management
A comprehensive academic program dedicated to building infrastructure and a step-by-step cybersecurity strategy for your company.
Information and Cybersecurity Management
Program Overview
The micro-masters program provides practical knowledge for building a strategy and infrastructure to protect companies in cyberspace. Over 14 weeks, we will progress from understanding fundamental cyber threats to implementing strategic-level defense scenarios. You will learn to analyze and forecast risks for the markets of Ukraine, the USA, and Europe.
During the course, you will work on your own project – developing a step-by-step cybersecurity strategy for your company or based on a real case study. With the opportunity for continuous communication and feedback from instructors and mentors, you will be able to apply the acquired knowledge in practice and complete the program with a ready-to-implement strategy for your company.
What you will learn
Program Units
Module 1. Fundamentals of Cyber Security
Learn cybersecurity fundamentals, including how to detect threats, protect systems and networks, and anticipate potential cyber attacks.
- Topics Include
- Submodule 1 — Computing Security Concepts and Problems
- Submodule 2 — Cryptography and PKI, trusted services
- Submodule 3 — Networking and communication
- Submodule 4 — Systems Hardening
- Submodule 5 — BCP, IRP, DRP
Module 2. Global Project Management and Leadership
Global project management framework requests from leaders, the trifecta of skillsets: leadership, strategic business management, and technical project management.
- Topics Include
- Submodule 1 — Technical Project management
- Submodule 2 — Cybersecurity Leadership Essentials
- Submodule 3 — Business management
Module 3. Cybersecurity Risk Management
Learn key principles of risk analysis, risk assessment, and risk mitigation for information security using both qualitative and quantitative methodologies.
- Topics Include
- Submodule 1 — Introduction to cybersecurity risk management
- Submodule 2 — Cybersecurity Risk Management Process
- Submodule 3 — Standards and Frameworks for Cyber Risk Management Approach
Module 4. Supply Chain Security Management
Supply chain security is the part of supply chain management that focuses on the risk management of external suppliers, vendors, logistics, and transportation. The learning objective of the module is to provide knowledge and skills for identifying, analyzing, and mitigating the risks inherent in working with other organizations as part of a supply chain.
- Topics Include
- Submodule 1 — Supply chain and third party services
- Submodule 2 — Threats and supply chain security
- Submodule 3 — Best practices & frameworks
Module 5. Security Governance, Ethics, and the Legal Environment
The module aims to provide data, insights, and recommendations on non-technical aspects of cybersecurity. It helps to address ethical and legal challenges in securing the digital infrastructure.
- Topics Include
- Submodule 1 — International and local legislation in cybersecurity
- Submodule 2 — Cybersecurity Governance
- Submodule 3 — Ethics, privacy and human rights in cybersecurity
MENTORS AND TUTORS
Oleksii Baranovskyi
Nick Gicinto
Former American CIA Officer, ex-Tesla, ex-Uber.
Nick Gicinto is an executive security leader and veteran of the Central Intelligence Agency (CIA). After transitioning to the private sector, Nick was instrumental in establishing insider threat and intelligence programs at both Tesla and Uber. He also assumed the role of Vice President at RiskIQ, which has since become a part of Microsoft. Subsequently, Nick played a crucial role in helping Chainlink Labs, a prominent blockchain company, establish its security intelligence program. In addition to his corporate endeavors, Nick serves as CISO and Professor of Practice in Cybersecurity at the William Jewell College and Adjunct Professor at SET University.
Benefits
The opportunity to develop a step-by-step cybersecurity strategy for your company with the support of instructors and mentors.
Instructors are expert practitioners from Ukraine, the USA, and Europe, with experience at the CIA, Salesforce, Tesla, Uber, Sigma Software, and Octava Defence.
Study in a group of like-minded individuals facing similar challenges, including technical team leaders, DevOps professionals, and company founders.
Adaptive online learning — can be combined even with full-time job
Feedback from first-year students
Tamara Berestyana
What did you like most about the program?
The interactive workshops and expert meetings were especially enjoyable because the topics covered during the sessions—AI, 5G expansion, and online security—are highly relevant today. Additionally, the fact that the training was conducted in English provided extra practice. It was an opportunity to gain unique information and experience from experts with real expertise.
Did you like the program’s instructors?
Yes! The communication was easy, and they treated you as an equal. You could openly ask questions and always received feedback.
What advice would you give to future SET University students?
Study at SET University!
Are you applying the knowledge you gained in the program to your work? Perhaps there are already some results that show how the training has impacted your professional activities?
The knowledge I’ve gained from the program is very helpful in managing projects and communicating with partners in my professional work. In my academic work, I published an article (based on the course’s final project) and continue to research this topic in my PhD studies.
Oleh Khavrukh
What did you like about the program?
The program is intense and interesting.
What was the main insight you gained from the training?
I relearned how to learn. After a 25-year break since finishing university, I realized that the approach to teaching and presenting material is different now, and it’s important to acknowledge and accept this.
Did your expectations match the reality?
Overall, yes.
What advice would you give to the next cohort of students in this program?
You should understand that this is a micro-master’s program specifically in Information Security Management, not SecOps or hacker courses. Therefore, this course is primarily aimed at those who want to grow in the field of cybersecurity and focus on managing processes and personnel.
Are you applying the knowledge you gained in the program to your work? Perhaps there are already some results that show how the training has impacted your professional activities?
I am actively applying the knowledge I’ve gained in my work to provide services to clients. At the moment, I am planning to launch a new service line for improving cybersecurity measures, involving colleagues I met during the Cyberdefender workshop for veterans. The training gave me a clear perspective on the cybersecurity field and an opportunity to acquire additional knowledge in this area.
For whom
DevOps and DevSecOps specialists
Middle+ developers
Technical team leads
InfoSec specialists
System administrators
C-level management and other employees involved in the company’s security strategy
Frequently Asked Questions
Who is eligible to apply for the MicroMasters program?
The Cybersecurity MicroMasters program is intended for those who have completed a STEM Bachelor’s degree or have a minimum of two years of work experience in a technical environment.
Note: coding experience ISN’T NECESSARY for this program.
Is it necessary to have coding skills to study at this program?
No, programming skills are not required for this program.
What is a MicroMaster's program?
A MicroMaster’s program is a mid-term program (micro-credentials program) that includes several modules from the main master’s program. In addition, graduates receive ECTS credits for completing these modules, which can be used to transfer to a master’s program later.
What format will the classes be held in?
The program consists of online lectures and hands-on webinars with the subject matter expert. Within each module, students also undergo progressive testing, and at the end of the program, they present a final project demonstrating the acquired skills.
Can ECTS credits earned through this MicroMasters program be considered towards a Master's program in Cybersecurity?
Yes, learners who complete all six educational modules successfully (with 80%+ acceptance rate) and are accepted into the Master’s program may transfer credits.
Does the MicroMasters Certificate guarantee a job interview after completing the program?
Obtaining a MicroMasters Program certificate will give you the tools to stand out in the industry. But the certificate itself does not guarantee a job interview or a job. However, you can share your certificate on your LinkedIn page and resume to demonstrate your achievements and highlight the knowledge acquired.
Is there an opportunity to receive a scholarship?
Yes, the Information and Cybersecurity Management program offers scholarship spots for members of the Armed Forces of Ukraine and veterans, civil servants, and women who want to develop their careers in IT.
Partners
Learn more about the SET University program
Questions left?
Get a consultation: hello@setuniversity.tech