Loading...

POSTGRADUATE DIPLOMA OF

CYBER SECURITY


12 months | online + campus | employability focus


〉 The development of job-ready skills in the rising field of cyber security
〉 The best digital content with virtual labs and extensive e-library for additional online materials
〉 Interactive online workshops facilitated by cyber security experts
〉 Inspirational webinar series delivered by industry leaders
〉 A personal mentor working in the field of cyber security
〉 Team and organisation leadership skills
〉 Competency-based programme structure to support your employability

PROGRAM OVERVIEW

AT AIT, YOU GRADUATE WITH TWO PROFESSIONAL CERTIFICATION AND A POST-GRADUATE DIPLOMA
CYBER SECURITY CERTIFICATE

Month 1 - 6 | Online

LEADERSHIP CERTIFICATE

Month 7 - 9 | Online + Amsterdam

FINAL PROJECT + POST-GRADUATE DIPLOMA

Month 10 - 12 | Talentship/Practicum - Global

WHY CYBER SECURITY?

Increase of cyber threats are one of the biggest trends set to negatively impact business growth, and cyber crimes are expected to cost the world $6 trillion by 2021, up from $3 trillion in 2015. Employer demand for cyber security professionals are accelerating at an alarming pace. By following a career path in cyber security you can play a crucial role protecting your organisation from cyber risks and threats. Career opportunities includes

IT Security Analyst
Security Operations Center (SOC) Analyst
Vulnerability Analyst
Cybersecurity Specialist
Threat Intelligence Analyst
Security Engineer
Cybersecurity Analyst

ELU helps you prepare for the world’s hottest job by developing your technical and interpersonal skills and connecting you with employers in the Amsterdam metropolitan area.

Enrolment Dates

November 2019

May 2020

Total duration of this programme is 12 months. You should commit 12-20 hours per week to your learning.

Tuition Fee

9000 Euros

Payment options

Instalments: You pay while you study.
Upfront:You can pay the tuition fee as a whole. For more information please reach out to our Admissions Consultant at
info@amsterdam.institute

EQUIP YOURSELF WITH THE RIGHT SKILLS

THREAT MANAGER
THREAT MANAGER

Apply environmental reconnaissance techniques using appropriate tools, analyzing results, and implementing recommended response

VULNERABILITY ASSESSOR
VULNERABILITY ASSESSOR

Implement vulnerability management process and analyze results of the scan

INCIDENT RESPONSE HANDLER
INCIDENT RESPONSE HANDLER

Distinguish threat data to determine incident impact and prepare a toolkit with appropriate tools and strategies

SECURE NETWORK BUILDER
SECURE NETWORK BUILDER

Use data to recommend remediation of security issues and recommend implementation strategy while participating in the Software Development Life Cycle (SDLC).

CURRICULUM

Engage with each other and the programme, and explore the cyber security domain and essential cyber security competencies in this module. Discover your learning preferences and practice how to work with your action learning group. Acquaint yourself with the learning tools & resources and learn how to build your professional e-portfolio to showcase your skills in cyber security for prospective employers.

Master the network security basics as well as securing files, websites, users and mail servers. Also learn how to use the tools and technologies required to deploy and troubleshoot a company’s security infrastructure.

Apply environmental reconnaissance techniques using appropriate tools and processes. Analyze the results of a network reconnaissance. Implement or recommend the appropriate response and countermeasure to a network-based threat. Explain the purpose of practices used to secure a corporate environment.

Implement an information security vulnerability management process. Analyze the output resulting from a vulnerability scan. Compare and contrast common vulnerabilities found
in an organization.

Distinguish threat data or behavior to determine the impact of an incident. Prepare a toolkit and use appropriate forensics tools during an investigation. Explain the importance of communication during the incident response process. Analyze common symptoms to select the best course of action to support incident response. Summarize the incident recovery and post-incident response process.

Explain the relationship between frameworks, common policies, controls, and procedures.
Use data to recommend remediation of security issues related to identity and access management. Review security architecture and make recommendations to implement compensating controls. Use application security best practices while participating in the Software Development Life Cycle (SDLC). Compare and contrast the general purpose and reasons for using various cybersecurity tools and technologies.

Develop self-awareness about your intentions, values and beliefs as a cyber security professional to better understand and articulate your purpose in your career. Engage in dialogic conversations in which you create opportunities for active listening and to engage and learn from each other by utilizing a relational process of peer coaching.

Get introduced to the fundamentals of team facilitation and coaching that includes skills such as creating an inclusive environment for every team member, building trust and support in the team, leading decision-making and problem-solving processes.

Adopt an organisational perspective and develop advanced-level context-sensitive skills that are required in deciding on developmental interventions. Acquire a set of techniques and tools that are intended to increase your professional impact.

Discover and discuss contemporary theories of leadership including concepts such as community leadership alongside stewardship and servant leadership that cyber security professionals can adopt within their communities.

The final project is intended to support you towards your action plans to improve your practices in your organisations. The principle question to ask is “How can I improve my practice?” With this question in mind, this module offers a practical and structured way of applying action research in your workplace. The outcome of the following modules is intended to be a submission of a work-based project along with a written report and a presentation

ARE YOU READY TO CHOOSE YOUR FUTURE?

APPLY NOW FOR PG DIPLOMA OF CYBER SECURITY PROGRAMME
01

Online application form

This quick form will help us understand whether you meet the basic requirements

02

Analytical test and Motivation

If your profile is shortlisted, you are invited to an online analytical test and asked to submit a statement of motivation.

03

Selection and Enrolment

Upon enrolment we will ask for a copy of your undergraduate diploma and transcript, as well as proof of English proficiency.

Prerequisites:
– An undergraduate degree in a technical computing discipline such as computer engineering, computer science or information science
– At least 2 years of professional experience in IT and security

If you are unsure whether you meet the prerequisites for the course, please write us at info@amsterdam.institute

powered by Typeform
  • Address

    SCIENCE PARK 408 1098 XH AMSTERDAM

  • EMAIL

    INFO@AMSTERDAM.INSTITUTE

  • Phone

    +31-20-369-0734