Enterprise Cybersecurity

Using data science as a game-changer

Get Your Brochure

Course Dates

STARTS ON

TBD

Course Duration

DURATION

6 weeks, online
4-6 hours per week

NYU Tandon Online Ranked #7

NYU is ranked No. 7 in 'Best Online Master's in Computer Information Technology Programs' in 2022 and has consistently ranked in 'Best Online Graduate Engineering Programs' by U.S. News & World Report

Leverage data science to increase cybersecurity

The global cybersecurity landscape is expanding and changing rapidly. Organizations large and small are facing heightened risk as traditional security methods give way to the emergence of real-time identity authentication methods. Accenture polling indicates that 68% of business leaders feel their cybersecurity risks are increasing. However, the low level of existing protection maybe even more concerning—on average, only 5% of companies are properly protected (Varonis). Leverage data science to increase cybersecurity.

A key element in the cybersecurity toolbox is the strategic understanding of the role of data science in increasing cybersecurity resiliency at an enterprise level. Leaders can harness data science methods to manage cyber risk to improve and in some cases create new control capabilities to achieve cybersecurity resilience.

This program will provide you with:

  • Advice on cutting-edge strategies necessary to advance your career in cybersecurity.
  • Skill to understand the correlation between data science and cybersecurity risk at an enterprise level.
  • Insight on both traditional methods and on new and emerging systems.
  • Insight in identifying and analyzing patterns for deviations and threats.
  • Skills to develop innovative practices to attract, retrain, and retain talented cybersecurity personnel.

$352.25B

The cybersecurity market is expected to be worth $352.25 billion by 2026, growing 14.5% annually.

SOURCE: MORDOR INTELLIGENCE

5%

On average, only 5% of companies' folders are properly protected.

SOURCE: COMPTIA

$600B

Cybercrimes cost the world nearly $600 billion each year, equivalent to 0.8% of the global GDP.

SOURCE: MORDOR INTELLIGENCE

Impact

  • Managers will learn how to improve their organizations' preparedness and response against cyberattacks and grow their careers as leaders in robust cybersecurity strategies.
  • Gain an overall understanding of how data science and cybersecurity work together to create quality data inputs that result in effective key performance indicators (KPIs).
  • Learn how using data science methods enhances the resilience of cybersecurity at the enterprise level.
  • Learn to collaborate with cybersecurity and data science professionals to create new control capabilities to achieve cybersecurity resilience.
  • Learn how to hire and develop talent for these practices at the enterprise level.

Who Is This Program For?

This course was designed to provide cybersecurity and data science professionals with a strategic understanding of how data science can be used to manage cyber risk, positioning them for career progression as cybersecurity specialists.

  • Mid-career cybersecurity and data science professionals looking to advance their work/career by staying on top of the latest cybersecurity tools and techniques.
  • Mid-level professionals in information technology and information security looking to understand offensive cybersecurity as a way to move up in a high-growth field with high-demand job opportunities.
  • Cybersecurity consultants who want to improve their organizations' preparedness and response against cyberattacks and grow their careers as leaders in offensive cybersecurity strategies.

Program Highlights

Computer

Analyze how data scientists and cybersecurity professionals can collaborate

Human Head with Graph

Develop innovative practices to attract, retrain, and retain talented cybersecurity personnel

Computer

Apply machine learning algorithms to identify threats in real time leveraging machine learning to identify patterns

Paper and pen

Evaluate use cases to measure deviation patterns in real-time to identify threat actors

Program Syllabus

In this program, you will examine the unique role of machine learning and data science in creating effective cybersecurity environments. You will also learn how these disciplines combine to increase an organization's cybersecurity resiliency and explore the changing landscape of cybersecurity as advanced authentication choices become more prevalent.

Module 1:

Foundational Data Science and Machine Learning Concepts

Explore the use of data science methods to create a more resilient cybersecurity landscape at the enterprise level.

  • Analyze the role of Enterprise Cybersecurity
  • Discuss the law of large numbers in terms of cybersecurity applications
  • Learn how data science is applied to cybersecurity within an organization

Module 2:

How Does Data Science Influence Cybersecurity Practices?

Analyze how data science provides the analytical methods to produce higher-quality data and pattern analysis.

  • Discuss machine learning systems that learn and adapt without explicit instructions
  • Evaluate the seven steps to machine learning success
  • Compare and contrast deep learning and traditional machine learning

Module 3:

Examples of Enterprise Cybersecurity

Explore identity and access management (IAM), PAM, and third-party governance.

  • Analyze how the use of data science is a game-changer for IAM
  • Compare and contrast the conventional PAM approach with a data science-driven approach
  • Evaluate conventional third-party governance terms and conditions with data science methods that operate with risk scores in real time

Module 4:

Real-Time Authentication Cases

Study the emergence of continuous behavioral authentication as passwords become obsolete.

  • Discuss the changing landscape of cybersecurity and the growing obsolescence of passwords
  • Compare and contrast the spectrum of advanced authentication choices
  • Evaluate three primary benefits of continuous behavioral authentication

Module 5:

Resources, Tools, Reporting, and Dashboarding

Review how data science and cybersecurity work together to create quality data inputs that result in KPIs that measure the health of the organization.

  • Explain the importance of identifying quality data inputs to create KPIs
  • Evaluate how KPIs measure the health of a program, process, or control
  • Analyze key risk indicators in terms of inherent or residual risks
  • Learn how to choose your enterprise platform(s): purchase vs. build

Module 6:

Developing Talent for the Digital Enterprise

Understand how to hire talent when you find it, not when you need it.

  • Explain the importance of adjusting conventional hiring practices in market conditions that require change
  • Evaluate innovative talent development practices
  • Analyze the characteristics of leadership commitment in terms of talent scarcity and a changing market
  • Appraise the evolution of model-driven security

Module 1:

Foundational Data Science and Machine Learning Concepts

Explore the use of data science methods to create a more resilient cybersecurity landscape at the enterprise level.

  • Analyze the role of Enterprise Cybersecurity
  • Discuss the law of large numbers in terms of cybersecurity applications
  • Learn how data science is applied to cybersecurity within an organization

Module 4:

Real-Time Authentication Cases

Study the emergence of continuous behavioral authentication as passwords become obsolete.

  • Discuss the changing landscape of cybersecurity and the growing obsolescence of passwords
  • Compare and contrast the spectrum of advanced authentication choices
  • Evaluate three primary benefits of continuous behavioral authentication

Module 2:

How Does Data Science Influence Cybersecurity Practices?

Analyze how data science provides the analytical methods to produce higher-quality data and pattern analysis.

  • Discuss machine learning systems that learn and adapt without explicit instructions
  • Evaluate the seven steps to machine learning success
  • Compare and contrast deep learning and traditional machine learning

Module 5:

Resources, Tools, Reporting, and Dashboarding

Review how data science and cybersecurity work together to create quality data inputs that result in KPIs that measure the health of the organization.

  • Explain the importance of identifying quality data inputs to create KPIs
  • Evaluate how KPIs measure the health of a program, process, or control
  • Analyze key risk indicators in terms of inherent or residual risks
  • Learn how to choose your enterprise platform(s): purchase vs. build

Module 3:

Examples of Enterprise Cybersecurity

Explore identity and access management (IAM), PAM, and third-party governance.

  • Analyze how the use of data science is a game-changer for IAM
  • Compare and contrast the conventional PAM approach with a data science-driven approach
  • Evaluate conventional third-party governance terms and conditions with data science methods that operate with risk scores in real time

Module 6:

Developing Talent for the Digital Enterprise

Understand how to hire talent when you find it, not when you need it.

  • Explain the importance of adjusting conventional hiring practices in market conditions that require change
  • Evaluate innovative talent development practices
  • Analyze the characteristics of leadership commitment in terms of talent scarcity and a changing market
  • Appraise the evolution of model-driven security
Download Brochure

Program Faculty

Profile image of the program faculty, Jim Routh

Jim Routh

Board Member, Advisor, and Investor NYU Tandon School of Engineering

Jim Routh is an icon in the cybersecurity industry, recognized as a leader in using data science as a foundation for unconventional cybersecurity controls and enterprise resilience. He has headed cybersecurity teams in many large companies, including CVS Health, Aetna, and JP Morgan Chase... More info

Profile image of the program faculty, Daniel Carroll

Daniel Carroll

Principal Data Scientist Aetna

Daniel Carroll leads a research and development team at Aetna, working on machine learning problems in healthcare. He heads machine learning development efforts inside the company's digital transformation wing, develops standard practices for deep learning, and advises on modern data science workflows for Aetna's evolving cloud infrastructure... More info

Certificate

Certificate

Upon successful completion of the program, participants will be awarded a verified digital certificate from NYU Tandon.

Download Brochure

FAQs

  • How do I know if this program is right for me?

    After reviewing the information on the program landing page, we recommend you submit the short form above to gain access to the program brochure, which includes more in-depth information. If you still have questions on whether this program is a good fit for you, please email learner.success@emeritus.org, and a dedicated program advisor will follow-up with you very shortly.


    Are there any prerequisites for this program?

    Some programs do have prerequisites, particularly the more technical ones. This information will be noted on the program landing page, as well as in the program brochure. If you are uncertain about program prerequisites and your capabilities, please email us at learner.success@emeritus.org for assistance.


    Note that, unless otherwise stated on the program web page, all programs are taught in English and proficiency in English is required.


    What is the typical class profile?

    More than 50 percent of our participants are from outside the United States. Class profiles vary from one cohort to the next, but, generally, our online certificates draw a highly diverse audience in terms of professional experience, industry, and geography — leading to a very rich peer learning and networking experience.


    What other dates will this program be offered in the future?

    Check back to this program web page or email us at learner.success@emeritus.org to inquire if future program dates or the timeline for future offerings have been confirmed yet.

  • How much time is required each week?

    Each program includes an estimated learner effort per week. This is referenced at the top of the program landing page under the Duration section, as well as in the program brochure, which you can obtain by submitting the short form at the top of this web page.



    How will my time be spent?

    We have designed this program to fit into your current working life as efficiently as possible. Time will be spent among a variety of activities including:



    • Engaging with recorded video lectures from faculty
    • Attending webinars and office hours, as per the specific program schedule
    • Reading or engaging with examples of core topics
    • Completing knowledge checks/quizzes and required activities
    • Engaging in moderated discussion groups with your peers
    • Completing your final project, if required

    The program is designed to be highly interactive while also allowing time for self-reflection and to demonstrate an understanding of the core topics through various active learning exercises. Please contact us at learner.success@emeritus.org if you need further clarification on program activities.



    What is it like to learn online with the learning collaborator, Emeritus?

    More than 250,000 professionals globally, across 80 countries, have chosen to advance their skills with Emeritus and its educational learning partners. In fact, 90 percent of the respondents of a recent survey across all our programs said that their learning outcomes were met or exceeded.

    A dedicated program support team is available 24/5 (Monday to Friday) to answer questions about the learning platform, technical issues, or anything else that may affect your learning experience.


    How do I interact with other program participants?

    Peer learning adds substantially to the overall learning experience and is an important part of the program. You can connect and communicate with other participants through our learning platform.

  • What are the requirements to earn the certificate?

    Each program includes an estimated learner effort per week, so you can gauge what will be required before you enroll. This is referenced at the top of the program landing page under the Duration section, as well as in the program brochure, which you can obtain by submitting the short form at the top of this web page. All programs are designed to fit into your working life.

    This program is scored as a pass or no-pass ; participants must complete the required activities to pass and obtain the certificate of completion. Some programs include a final project submission or other assignments to obtain passing status. This information will be noted in the program brochure. Please contact us at learner.success@emeritus.org if you need further clarification on any specific program requirements.


    What type of certificate will I receive?

    Upon successful completion of the program, you will receive a smart digital certificate. The smart digital certificate can be shared with friends, family, schools, or potential employers. You can use it on your cover letter, resume, and/or display it on your LinkedIn profile. The digital certificate will be sent approximately two weeks after the program, once grading is complete.


    Can I get the hard copy of the certificate?

    No, only verified digital certificates will be issued upon successful completion. This allows you to share your credentials on social platforms such as LinkedIn, Facebook, and Twitter.


    Do I receive alumni status after completing this program?

    No, there is no alumni status granted for this program. In some cases, there are credits that count toward a higher level of certification. This information will be clearly noted in the program brochure.


    How long will I have access to the learning materials?

    You will have access to the online learning platform and all the videos and program materials for 12 months following the program start date. Access to the learning platform is restricted to registered participants per the terms of agreement.

  • What equipment or technical requirements are there for this program?

    Participants will need the latest version of their preferred browser to access the learning platform. In addition, Microsoft Office and a PDF viewer are required to access documents, spreadsheets, presentations, PDF files, and transcripts.


    Do I need to be online to access the program content?

    Yes, the learning platform is accessed via the internet, and video content is not available for download. However, you can download files of video transcripts, assignment templates, readings, etc. For maximum flexibility, you can access program content from a desktop, laptop, tablet, or mobile device.

    Video lectures must be streamed via the internet, and any livestream webinars and office hours will require an internet connection. However, these sessions are always recorded, so you may view them later.

  • Can I still register if the registration deadline has passed?

    Yes, you can register up until seven days past the published start date of the program without missing any of the core program material or learnings.


    What is the program fee, and what forms of payment do you accept?

    The program fee is noted at the top of this program web page and usually referenced in the program brochure as well.

    • Flexible payment options are available (see details below as well as at the top of this program web page next to FEE).
    • Tuition assistance is available for participants who qualify. Please email learner.success@emeritus.org.

    What if I don’t have a credit card? Is there another method of payment accepted?

    Yes, you can do the bank remittance in the program currency via wire transfer or debit card. Please contact your program advisor, or email us at learner.success@emeritus.org for details.


    I was not able to use the discount code provided. Can you help?

    Yes! Please email us at learner.success@emeritus.org with the details of the program you are interested in, and we will assist you.


    How can I obtain an invoice for payment?

    Please email learner.success@emeritus.org with your invoicing requirements and the specific program you’re interested in enroling in.


    Is there an option to make flexible payments for this program?

    Yes, the flexible payment option allows a participant to pay the program fee in installments. This option is made available on the payment page and should be selected before submitting the payment.


    How can I obtain a W9 form?

    Please email us at learner.success@emeritus.org for assistance.

  • What is the policy on refunds and withdrawals?

    You may request a full refund within seven days of your payment or 14 days after the published start date of the program, whichever comes later. If your enrollment had previously been deferred, you will not be entitled to a refund. Partial (or pro-rated) refunds are not offered. All withdrawal and refund requests should be sent to admissions@emeritus.org.



    What is the policy on deferrals?

    After the published start date of the program, you have until the midpoint of the program to request to defer to a future cohort of the same program. A deferral request must be submitted along with a specified reason and explanation. Cohort changes may be made only once per enrollment and are subject to availability of other cohorts scheduled at our discretion. This will not be applicable for deferrals within the refund period, and the limit of one deferral per enrollment remains. All deferral requests should be sent to admissions@emeritus.org.

Apply Now

Early registrations are encouraged. Seats fill up quickly!