Threat Intelligence and Cybersecurity Analytics

Learn to effectively communicate cybersecurity strategies to boards and leadership teams.
Country/Region
Inquiring For
Total Work Experience

Impact

Upon completion of the program, participants will be equipped with:

  • Knowledge of the threat intelligence life cycle.

  • Approaches to perceiving and neutralizing cyberthreats before harm can be done.

  • Executive-level risk management skills to engage the Board of Directors' ineffective governance of cyber risk.

  • Techniques to extend your threat intelligence program knowledge to support local, industry-specific, regional, and international intelligence sharing efforts.

  • Insights into continuous monitoring and the importance of identifying changes to risk posture.

Who Is This Program For?

This program prepares technology leaders, cybersecurity professionals, and aspiring Chief Information Security Officer (CISOs) to perceive and neutralize cyber threats before harm can be done. It is ideal for:

Mid-level Cybersecurity Professionals seeking to advance their current skill set to include threat intelligence.

Early to Mid-Career IT/Technology Professionals seeking to develop capabilities within the cybersecurity field with the intent to transition to a security team or take on added responsibilities.

Mid-senior leaders in IT/InfoSec function seeking to implement threat intelligence tools and frameworks in their organization.

Program Highlights

Board with human and text

Identify the types of data that are measured using cybersecurity analytic tools.

Triangle and Exclaimation

Develop security protocols designed to increase continuous threat awareness and quantify risk.

Triangle and Exclaimation

Develop the risk profile of an organization using security risk rating tools that inspect the internet-facing assets of organizations and measure vulnerabilities using open-source intelligence (OSINT).

Star type design

Develop a threat modeling diagram

Different humans connected

Different humans connected

Program Syllabus

This program takes a holistic approach to cybersecurity and prepares technology leaders, cybersecurity professionals, and aspiring CISOs to effectively identify, assess, and model risk before harm can be done. This program will help you:

Program Faculty

LP - NYUT-TICA - Program Faculty - Image
MIKE WILKES

Adjunct Professor, NYU Tandon

Professor Wilkes is an information technology and security expert, public speaker, philanthropist, author, musician, and occasional internet jazz radio DJ. Currently the chief...

Certificate

Certificate

Upon successful completion of the program, participants will be awarded a verified digital certificate by NYU Tandon.

FAQs

idn't find what you were looking for? Write to us at learner.success@emeritus.org or Schedule a call with one of our Program Advisors or call us at +1 680 205 8507 (US) / +44 145 370 2595 (UK) / +65 3163 6129 (SG)

Early registrations are encouraged. Seats fill up quickly!

Flexible payment options available.

Starts On