Cybersecurity Risk Management

  • Online
  • $950

This is one of two courses in the UBC Micro-certificate in Cybersecurity Strategy and Risk Management.

This business-oriented course explores popular cybersecurity attack vectors, and how different defence mechanisms can be used to secure and minimize impact on your infrastructure and resources, including connected devices, networks, applications and systems.

Focus on critical controls and procedures for monitoring and minimizing cybersecurity risks. Come away with key business processes to create, execute and manage a cybersecurity risk management plan for your organization. Become your organization’s security champion, and implement plans to ensure organization-wide governance and compliance.

By the end of this course, you’ll be able to:

  • explain the importance of cybersecurity risk management, and the potential impacts of data breaches to key stakeholders
  • explain common cybersecurity threat vectors, and design remediation strategies with appropriate defence controls
  • evaluate open-source cybersecurity implementations, and explain how they contribute to cyber resilience
  • design and develop a cybersecurity risk management program that incorporates a communications plan for incident response.

While designed with professionals and leaders in mind, this course covers technical as well as strategic concepts that are connected back to business goals and operations.

You have access to optional pre-readings to get you up to speed on technical course content. For those with strong technical backgrounds, the course also includes optional technical deep dives for select cybersecurity risks and their associated mitigations.

Course outline

Week 1: Into the Breach. Start by reviewing data breach scenarios, impacts and remediations. Choose and explore a critical data breach scenario, then create an incident summary report.

Week 2: Remediating Threat Vectors. Understand different cyber threat scenarios, and how to perform threat modelling for your organization. Create a top threat list for your chosen scenario with potential remediations.

Week 3: Examining Cybersecurity Tools. Explore popular open-source frameworks and tools for defending against cybersecurity risks. Choose from a variety of approaches and tools to add cybersecurity controls to your risk management plan.

Week 4: Governing Cybersecurity Risks. Formalize your cybersecurity risk management plan, and review common strategies for responding to cybersecurity incidents. Understand review cycles and maintain an updated risk management plan.

How am I assessed?

You’re assessed on weekly activities and a risk management plan you develop in the course that demonstrate your proficiency and achievement of competencies. Your work is assessed using a rubric, and your instructor also provides you specific and actionable feedback.

Expected effort

Expect to set aside approximately 5-7 hours a week to complete all learning activities, including attending the live sessions.

Technology requirements

To take this course, you’ll need access to:

  • an email account
  • a computer, laptop or tablet under five years old using Windows or Mac OS
  • the latest version of a web browser (or previous major version release)
  • a reliable internet connection
  • a video camera and microphone.

Course format

This 100% online instructor-supported course combines self-paced independent study with group discussion and live sessions held Wednesdays from 6pm to 8pm Pacific Time.

Outside of class time, you can access other materials online at your own pace. Each week, review readings, whitepapers and videos. Contribute to an online forum where you apply your learning to discuss different examples of cybersecurity standards.

Please note you can log in to your course for up to eight weeks after the course ends. You'll no longer be able to access course materials after this time.

One business day before the course start date, we'll email you step-by-step instructions for accessing your course.

Available sessions

Available course sessions
Dates Days Time Format Tuition Description
Wed 6:00 pm Online $950

Related courses

How can we help?

We’re here to answer your questions, discuss learning options and provide insights, recommendations and referrals.  

Facebook The logo for the Facebook social media service. Instagram The logo for the Instagram social media service. Linkedin The logo for the LinkedIn social media service. Question A question mark inside a solid circle. Twitter The logo for the Twitter social media service. Youtube The logo for the YouTube video sharing service. RSS The symbol to indicate an RSS feed. Arrow An arrowhead pointing to the right Arrow, right to bracket An arrowhead pointing to the right, into a bracket character. External Link An arrowhead pointing up and to the right, from inside a box Bars Three horizontal bars. Books Three book spines, viewed head-on, one leaning. Calendar A monthly calendar page. E-commerce Cart A shopping cart Checkmark A checkmark character Chevron A chevron character pointing to the right Checkmark A checkmark character inside a solid circle Cost A dollar sign inside a solid circle Info An 'i' character inside a solid circle Play An arrowhead pointing to the right inside of a solid circle User A silhouette of a person inside a solid circle Envelope A closed envelope Certificate A document with an award pinned to it Pen A document with a pen beside it Filter A funnel / filter silhouette Laptop Computer An open laptop computer with a blank screen Location Pin A map location pin Search A magnifying glass Minus A minus sign News A folded newspaper Plus A plus symbol indicating more or the ability to add Quote, left An opening quotation character Alert An exclamation point inside a solid triangle User A silhouette of a person Close The character 'X'