Executive Master In Cybersecurity Management
Who is the programme aimed at?
Profile
This programme is intended for professionals requiring managerial and practical knowledge of the six domains representing the pillars of cybersecurity activities and management practices.
Key admissions criteria
- At least 5 years as a digital or cybersecurity manager
- Actively involved in digital or cybersecurity activities and decision-making.
Your benefits
Information Security and Cybersecurity leaders have relied on Solvay Lifelong Learning since 2007 to gain relevant competences for promoting their career. And thanks to its new blended learning model, the Executive Master in Cybersecurity takes a new shape to enable participation from across Europe.
Aligned with European standards, regulations, and practices, the Executive Master in Cybersecurity Management addresses essential domains of knowledge, as well as fundamental challenges in order to protect organisations from cyber threats.
Accessible across Europe thanks to a hybrid education model:
- Fundamentals by self learning through recommended readings and videos;
- On-site case study activities with peers from various locations;
- On-site lectures from leading experts.
Overview of the programme
This programme is intended for professionals requiring managerial and practical knowledge of the six domains representing the pillars of cybersecurity activities and management practices.
A combination of 6 bodies of knowledge
1 . Information Security Leadership
January - February 2024
The management activities of Cybersecurity leaders includes the governance process, the business risk management process, the implementation process, and the incident management process. This module shall...
2 . Security Controls
March - April 2024
A review of enterprises landscape including business objectives and requirements collection for security controls. A thorough understanding of security controls in various domains and including...
3 . Security Architecture
May - June 2024
The architectural landscape is demystified, and components are identified to ensure adequate protections. Various architectural models shall be acquired by participants. The creation and implementation...
4 . Security Operations
September - October 2024
Business operations and information availability and integrity require the involvement of the whole organisation. Activities leading to building an adequate continuity are...
5 . Cybersecurity Battleground
November - December 2024
Cybersecurity management practices require the knowledge of own business, its functional and technical vulnerabilities and the threat landscape that needs to be addressed. The capabilities that...
6 . General Management
Spread over the year
General management practices are essential knowledge for leaders and managers. Various practices shall be addressed: principles of...
More programme features
Blended and Hybrid education model
The first five modules are delivered over two months each with a combination of self-paced and ex-cathedra class on-site (also available in virtual classes fort those unable to attend physically). Blended Learning is applied for each module as follows:
Part 1 (Acquire in an offline learning mode): Plan for a minimum of 12 hours of self-learning where participants obtain self-study resources.
Part 2 (Evaluate): A short self-evaluation survey to test the readiness to attend the F2F classes.
Part 3 (Build expertise): Attend onsite classes and workshops that are also available remotely.
Part 4 (Group Case study): Groups of participants remotely address specific cases related to each module.
Part 5 (Final delivery): Participants present the deliverables of their case study to a jury. This is followed with knowledge-based examination.
Adjusted to your own needs and career targets
A career development tool is available to participants to assess their competences against current or targeted roles.
On that basis, they adjust their education experience to focus on those domains that they require most.
As a result, both phases 1 (Acquire) and 4 (Case study) are required to address those focus areas.
A personal acceptance interview is conducted to formalise the study plan and to level up the participants.
An exit interview is conducted at the graduation time.
Participants.
The course was a great learning experience and it opened for me a new career opportunity in Cybersecurity. I learned a lot from the discussions and exchanges on information security topics, and I was able to built an expanded professional network to advance my career in Information Security.
Academic Leadership & Faculty
This "HR issue" is what is going to limit us in the years to come".
Our sponsors
Leading Belgian French-speaking business school