Cybersecurity Management Program

You will gain the most up-to-date knowledge on how to apply cybersecurity principles across different businesses and institutions. Learn from internationally renowned experts, interact with industry leaders in a premier executive education program designed by Constructor Learning.

cybersecurity image
clock

intensive
short-term course

3

days

remote

On-site / Remote

language

English

Program overview

The Cybersecurity landscape has been marked by increasingly complex threats over the last few years, with highly damaging consequences for organizations and end-point users. Leaders, institutions, and companies must therefore develop resilient risk mitigation strategies. Such measures require a complete realignment in the threat-led approach, as Cybersecurity now represents a strategic digital transformation issue for high-performing enterprises.

Yet a critical Cyber-risk skills and workforce gap remains. Therefore, equipping your staff with the most up-to-date intelligence is vital to delivering effective responses and targeted action to outsmart cyber-disruption.

Through our course, you will learn to confidently navigate the digital realm to identify threats, secure your organization and assets, harden your digital defenses, and seize new business possibilities.

Location:

location pin icon

coming soon

Program Dates:

calendar icon

coming soon

3 Days Program

Program Fee:

General fee

€ 3,000

Constructor Alumni Members Fee

€ 2,700

Corporate fee applicable for 3-5 participants per company.

Program format

The Cybersecurity Program is an offline intensive learning course with a comprehensive combination of various methodologies:

Interactive lectures by an academic expert

Expert lectures by experienced leaders in Cybersecurity

Real-life case discussions

Group work and exchanges

Networking sessions

Apply
digital

What you will learn

module

A foundational knowledge on Cyber-risk

module

An in-depth understanding of universal frameworks to comprehend digital resilience and align security challenges with key business goals

module

The keys to asking the right questions about Cyber-risk management

module

The ability to apply NIST CSF to monitor your organization's approach and position

module

A strategic insight into the organizational considerations of leading Cybersecurity strategies

module

The operational realities behind the implementation of Cybersecurity strategies within your organization

module

The latest research, evidence, and best practices for any organization's cyber-resilience

Program Structure

day 1

Cybersecurity as a Boardroom Level Conversation

day 2

Cybersecurity Measurements and Investment

day 3

Cybersecurity Management and Strategy

Is This Program for Me?

Are you a prospective applicant? Does this program match your profile? Here is an overview of the Program’s areas of interest:

MANAGEMENT/ GOVERNANCE

If you are engaged at different managerial levels in organizations. You need to understand the key role of security and the need to recognize and support Cybersecurity at an organizational level.

ARCHITECT, DESIGNER (INFRASTRUCTURE, SOFTWARE, AAI)

If you are responsible for the design of a new system and/or its significant adaptations. You need to understand the implications and impacts of security precautions, identify security requirements, and address them through design.

ADMINS/OPERATORS (SYSTEMS MANAGEMENT, SYSTEM ADMINISTRATORS, NETWORK ENGINEERS)

If you are responsible for the operations of infrastructure components. The components cover a broad range of services, from network and operating systems and middleware, to end applications.

SECURITY SPECIALISTS

If you are responsible for security management and related operations. The role includes incident-handling and response, forensics, security monitoring, vulnerability management, and software assessment.

USER COORDINATORS (RESPONSIBLE FOR GROUP OF USERS, MAIN CONTACT POINT)

If you are responsible for managing a community of end users, granting access to resources or using/running identity management related to users, suspending/banning users.

ACQUISITION

If you are responsible for acquiring new facilities (hardware, software).

ANY PROFESSIONAL

If you want to gain a deeper understanding of Cybersecurity principles for your business.

FAQs

Will the short program provide a holistic view of the Cybersecurity landscape?

Through our course, you will learn to confidently navigate the digital realm to identify threats, secure your organization and assets, harden your digital defenses, and seize new business possibilities.

What is Cybersecurity, and why is it important to learn?

Cybersecurity involves tools, services, systems, and best practices designed to help with the detection, prevention, and mitigation of crime that involves the internet. There are common types of cyberattacks that Cybersecurity aims to address, including phishing, malware, ransomware, and cyberterrorism. The purpose of cyberattacks varies, but some common motivations are to steal private information or demand money. Information Security can be a competitive advantage because it allows you to be better than your business competitors. If you and your competitors must meet certain security standards (like PCI, HIPAA or GDPR), and if you can do it more efficiently than your competition, your business gains a competitive advantage. Additionally, that competitive advantage is further enhanced because a strong cybersecurity program encourages business innovation.

How is the program structured?

The Cybersecurity Program is an offline intensive learning course over 3 days.

What if I have specific questions not covered here?

If you have any additional questions about admissions to the program, or the course material please contact the Constructor Learning Office at Contact us | Constructor Learning
Contact us

Your instructors

Team Member

Lior Tabansky

Head of Cyber Resilience Lab at Tel Aviv University

Bio
Researcher, professor, and practitioner in the field of cyber resilience for digital transformation. Author of books and scientific publications.
Team Member

Candid Wüest

VP of Cyber Protection Research at Acronis

Bio
As Senior Principal Threat Researcher, he evaluated current and future trends in the threat landscape and researched new protection methods.

Upcoming events

Attend one of our events. Discover our upcoming workshops, info sessions, final presentations and webinars on trending topics.

  • Introduction to Generative AI and ChatGPT

    31. May 23, 06:00 PM - 08:30 PM GMT+2
    Heinrichstrasse 200, 8005 Zurich or online via Zoom

    Join us for an immersive workshop: "Intro to Generative AI and ChatGPT"! Explore the fascinating world of Generative AI and ChatGPT in this hands-on workshop, where we'll focus on the exciting use-cases and applications, rather than delving into the technical details of how it is built. Unlock the power of Generative AI and ChatGPT as we dive into real-world examples and showcase their potential across various industries. From creative content generation to personalized customer interactions, discover how these technologies are revolutionizing the way we interact and create. Immerse yourself in interactive demonstrations and practical exercises that will empower you to harness the capabilities of Generative AI and ChatGPT. Gain valuable insights into leveraging these tools to enhance customer experiences, streamline workflows, and drive innovation. Don't miss out on this opportunity to step into the world of Generative AI and ChatGPT. Sign up now and embark on an exciting journey where imagination meets technology. Let's unleash the creative potential together!

    Details

  • Build a Spotify homepage clone from scratch with HTML, CSS, and JavaScript.

    14. Jun 23, 06:00 PM - 08:00 PM GMT+2
    Online via Zoom

    Join us as we groove through the basics of HTML, CSS, and JavaScript, and learn how to create a rockin' replica of the iconic Spotify homepage. You will start by creating the basic HTML structure and then dive into styling it with CSS. Finally, you will add interactivity to your webpage using JavaScript to make it look and feel like the real Spotify homepage. By the end of this workshop, you will have a good understanding of how to use HTML, CSS, and JavaScript together to create a beautiful and functional webpage. No prior experience is necessary – just bring your enthusiasm and a love for good tunes. Sign up now and let's get ready to code like rockstars!

    Details

  • Introduction to Natural Language Processing & ChatGPT

    21. Jun 23, 06:30 PM - 08:30 PM GMT+2
    Heinrichstrasse 200, 8005 Zurich or online via Zoom

    Get ready for an exceptional workshop on "Introduction to Natural Language Processing & ChatGPT"! We are pleased to announce our upcoming event on Wednesday, June 21, at Heinrichstreet 200, 8005 Zürich (or join us online). Deepen your learning experience through face-to-face interactions and experience a dynamic environment. Explore the fascinating world of natural language processing with hands-on instruction and expert knowledge. Your Python and Pandas skills will be valuable throughout the workshop. Whether you're a seasoned pro or a newbie, we'll make sure you can fully participate and expand your knowledge. Don't miss this enlightening NLP workshop! Reserve your place now for an enriching personal experience at 200 Heinrich Street, 8005.

    Details

  • Final presentations of our Full-stack and Data Science students

    28. Jul 23, 06:00 PM - 08:00 PM GMT+2
    Heinrichstrasse 200, 8005 Zurich or online via Zoom

    Get ready to witness the ultimate showdown of brainpower and creativity as our bootcamp graduates present their final projects to a jam-packed audience of students, alumni, family members, friends, and companies! These incredible projects were developed in just three weeks, as the culmination of a three-month training period. But wait, there's more! Constructor Learning cordially invites you to join us for this epic event, where you'll have the chance to marvel at these exciting projects and soak up some serious inspiration. Don't miss out on this incredible opportunity to witness the future of tech firsthand. Register now!

    Details

Empty room with chairs