Master in Cybersecurity Management Program

Protect your organization by becoming a leader in the exciting world of cybersecurity.

  • Format

    3 terms + Capstone Project

  • Languages

    English

  • Location

    Lille

  • Fees

    €17,900

  • Intake

    September

  • Credits

    120 ECTS

Accreditations

PROGRAM

The Master in Cybersecurity Management provides a strategic perspective on cybersecurity, preparing students for success in a digital landscape characterized by evolving security challenges.

The program is offered on a full-time basis and consists of 3 terms of courses and a professional experience. Alongside the courses, the program offers various workshops and corporate events to further develop students’ personal and professional skills. These cover a range of topics, from conflict management in cross-cultural environments to intercultural communication.

Program structure

IÉSEG’s Master in Cybersecurity Management is designed for students willing to live a fully cross-cultural and international experience, and offers two different tracks according to participants’ previous academic background:

> Fast Track: participants who have 4 years of higher education (Bachelor in 4 years, Master or “M1” validated by an official degree with an equivalent of 240 ECTS credits) in Management or in the field corresponding to this program at IÉSEG, may request exemption of the 3rd term (with no tuition fee reduction).

> Regular Track: for all participants. Mandatory for participants who have 3 years of higher education (Bachelor in 3 years, Licence/”Bac+3″ validated by an official degree with the equivalent of 180 ECTS credits).

Course Content

The program is offered on a full-time basis and consists of 3 consecutive terms of courses followed by a professional experience.

> Technology
This set of courses provides the foundational technical knowledge to understand the nature of the assets to be protected and the threat vectors exploited. These fundamental building blocks allow participants to either focus on the technical aspects of cybersecurity or to be able to engage meaningfully with technical personnel. 

> Cybersecurity
These courses establish the core knowledge and the practical security problem-solving skills required to assess the security of an organization, recommend and implement appropriate solutions, monitor and secure hybrid environments, including cloud, mobile and IoT, operate with an awareness of applicable laws and policies, including principles of governance, risk and compliance, and identify, analyse and respond to security events and incidents.

> Management
This set of courses covers the knowledge, skills, and abilities needed to manage organizational resources including physical, technical, intellectual, and human resources. They address managerial and leadership skills as well as the legal, compliance, and governance issues related to managing organizational risk.

ECTS

Technology

28

IT Infrastructure Foundations

6

This course provides the key concepts and terminology of computer technology including operating systems and networks including cloud infrastructure, blockchain, and Internet of Things (IoT). Infrastructure standards, protocols and models, basic network components, topologies, functions, and processes will be explored.

Linux Foundations

4

This course covers common tasks in major distributions of Linux, including the Linux command line, basic maintenance, installing and configuring workstations. It also covers basic shell scripting and automation. The curriculum is aligned to the CompTIA Linux+ certification exam.

Network Foundations

6

This course introduces students to basic networking concepts and technologies. It covers deploying maintaining, hardening, monitoring, and troubleshooting network infrastructure. The curriculum is aligned to the CompTIA Network+ certification exam.

Data Management Foundations

6

This course introduces basic concepts related to basic concepts of data schemas and dimensions while understanding the difference between common data structures and file formats. It provides the knowledge and skills required to conduct data mining and data manipulation, apply basic statistical analyses, and develop meaningful visualizations while adhering to governance and quality standards throughout the entire data life cycle. The curriculum is aligned to the CompTIA Data+ certification exam.

Programming Foundations

6

This course provides basic programming literacy by teaching students to design, write, debug, and run programs in the Python programming language as well as understand software development process including computer systems design and software testing. The curriculum is aligned to the Python Institute PCEP certification exam.

Cybersecurity

25

Cybersecurity Foundations

4

This course is intended to provide a general introduction to cybersecurity key concepts and terminology. It includes explaining the types of threat that cybersecurity must address, the controls that can be implemented and means of mitigating cyber risk. The need for security management in an organization is explained, and its main elements are introduced – including the key role played by risk management. The importance of standardized approaches to security management is explained, as is the notion of compliance.

Risk Management

4

The course introduces students to the fundamental principles of risk assessment and risk management, as they relate to information systems and the organizational threat landscape. Furthermore, students learn to assess and manage both quantitative and qualitative risks. They also learn to describe and apply the risk management life cycle. In addition, students learn to create and apply risk management communication and implementation strategies. Students learn to apply, and customize, common standards, practices, methods, and tools to assess and manage information risks for given scenarios. They learn how to avoid common risk-management issues, and how to assess the maturity level of risk management in an organization, so that it can be improved upon. Moreover, students learn about enterprise security controls and how they fit within the context of regulatory goals. They also learn how risk management can aid to ensure cyber security compliance.

Security and Technical Controls

4

This course explores various types of threats and how technical controls protect resources against unauthorized viewing, tampering, or destruction and serves as a primary means of ensuring privacy, confidentiality, and prevention of unauthorized access and disclosure. It focuses on access control and authentication, organizational behavior and social engineering, physical security, remote access control, cryptography, public key infrastructure and encryption.

Incident Response and Digital Forensics

4

This course allows students to acquire the necessary skills of threats detection and response, compromised systems real-time analysis, and advanced methods of cyberattack detection. Participants will learn to safely and ethically collect digital evidence, recover data, and organize digital imaging to help law enforcement prosecute those responsible for cybercrimes.

Current Issues in Cybersecurity

2

This course will focus on a specific area of cybersecurity that is specific issues in cybersecurity that are currently in the news or related to new technologies. All aspects will be discussed including the technology involved, the organizational impacts, legal implications, and mitigation strategies.

Pen Testing

2

This course provides hands-on pen testing training including vulnerability assessment, scanning and analysis, as well as planning, scoping, and managing weaknesses for the cloud, hybrid environments, web applications, Internet of Things (IoT) and traditional on-premises. The curriculum is aligned to the CompTIA PenTest+ certification exam.

Security Practitioners Colloquium

5

This course provides participants with the opportunity to learn from practitioners who discuss current threats, trends and challenges in cybersecurity and provides insights from their professional experience. Students will also be exposed to security issues unique to certain industries such as healthcare, banking and financial services, automotive, and law enforcement.

Management

15

Decision Analysis under Uncertainty

3

This course introduces decision analysis under uncertainty. The course consists of two parts. The first part focuses on normative decision analysis, showing how to make “rational” decisions under uncertainty. It presents the foundations of Bayesian inference and decision making from a didactical perspective. Students will learn the basic analytical toolbox to model real-world decision problems, which will enable them to carry out decision analyses and prepare them for further exploration. The second part of the course focuses on behavioral decision analysis, presenting various ways in which economic agents deviate from rationality due to cognitive biases in human judgment and decision making. This part will treat a range of topics from behavioral economics and psychology. At the end of the course, the students will be able to apply insights from decision analysis in their future personal and professional careers (1) to make better decisions for themselves, (2) to help others make better decisions, and (3) to better understand and predict people’s decisions in the face of uncertainty.

Cyber Law

4

The course will focus on the legal protection of technical tools exploited in the digital realm, such as software, platforms, and databases including DRMs and AI. Additionally, the course will focus on the protection of data circulating on the web. Thus, the course will contain an analysis of legal frameworks concerning personal data protection as well as a study of the provisions protecting non personal data, databases, and elaborated data. It will include an analysis of the GDPR, in a comparative fashion with US norms, and of Intellectual Property Rights, with a focus on copyright, neighboring rights, and trade secrets. Finally, the course will address the liability regimes that apply to host and content providers and contractual provisions that may be used in different frameworks.

Governance and Compliance

4

The course introduces students to the fundamental principles and ethical application of IS governance practices. Students learn about various IS governance frameworks. Furthermore, students learn to identify, describe, and apply applicable IS governance frameworks within an overall enterprise architecture framework. They learn to assess the maturity, in terms of the performance and management, of these activities within the organization. Students learn to apply IS governance in support of business strategies and objectives, whilst being aware of the limitations and common pitfalls when applying such governance frameworks.

Positive Leadership

4

Coming soon.

Innovation and New Business Development

16

Leading for Creativity and Design Thinking
Strategic People Management
Business Consultancy in a Digital Environment

8

2 courses to be chosen among:

Leading for Creativity and Design Thinking
Creativity is one of the critical components of an organization’s ability to survive and thrive in today’s competitive and dynamic markets. This course will provide participants with a rich understanding of how creativity can be facilitated and managed in a work setting. They will acquire knowledge regarding various theoretical conceptualizations (i.e., how do you define creativity), antecedents (i.e., what makes you and others more creative) and outcomes (i.e., what is the impact) of creativity as well as knowledge on design thinking techniques and tools to lead teams in the creative journey. How do creative ideas happen? How can we foster our creativity and the creativity of those around us? What are the paths of creative development of individuals who are successful in their creative endeavours? What are the implications for fostering and managing creativity in the workplace? What are the obstacles to creativity? What is the nature of creativity in teams and organizations? These are some of the questions we will address. During the course, a variety of teaching and learning techniques (including design thinking) will be used to enable participants to think critically and imaginatively about various perspectives of creativity. To realize the goal of a shared learning experience between participants and the instructor, the course is aimed at integrating real challenges and practical experiences of creativity, projects, presentations, experiential exercises, and critical reflection on the various course materials.

Strategic People Management
Description not available yet.

Business Consultancy in a Digital Environment
The course is designed to immerse students into the daily life of business consultants working for an ERP implementation company. Through interactive lectures, group assignments, and the intervention of four expert professionals, this course confronts students with the diverse expectations, tasks, and challenges functional consultants need to tackle. Combining theoretical concepts with hands-on exercises on a hypothetical business case, participants are expected to acquire knowledge on and experience with ERP deliverables and domains (i.e., Microsoft Dynamics 365), workflow design for top-level business processes (i.e.., Procure-to-Pay, Order-to-Cash), project management activities, and functional consulting analysis tools (e.g., XMind, Bizagi).

Career Program

4

The Career Program aims to help IÉSEG students build and implement their professional objective in line with their aspirations, skills and the socio-economic reality of the market. The objective is to facilitate their integration into the company, in an environment that allows them to develop personally and professionally A credited program offered to all students A specific program adapter to their track / major A dedicated team of experienced professional as professors An overall support: collective credit courses + digital resources + on demand coaching, for students expressing the need, provided by the CAREER team A cycle of thematical events creating bridges with companies and helping students to develop their network  Our pedagogical approach: an alternation of teaching methods to promote learning => digital modules, interactive courses, blended learning, coaching, peer to peer, learning by doing, live situations, debriefing and reflexivity – in line with the teaching and learning strategy @IÉSEG.

Entrepreneurship and New Business Development

4

This course provides participants with a profound understanding on entrepreneurship, new business development, and business plan writing. Through lectures, testimonials, fieldwork, and group assignments, participants are confronted with the how, where, when, whom, and why of starting and developing new business activities. As part of an international and multicultural team, participants are invited to work on an operational business plan aimed at either the creation of a new venture (NVC-track) or the acceleration of new business for an already established SME (NBD-track). This course’s ambitions thus go beyond providing theoretical insights. Hands-on experience is gained through out-of-class field work covering all steps of the entrepreneurial decision-making process (e.g., idea generation, feasibility analysis, industry study, market analysis, marketing plan, production plan, product development, and financial statements). In doing so, participants accumulate entrepreneurial knowledge and behaviors that support innovative solutions and new value development.

Language Courses

6

Language Courses

6

Credited Language courses for all levels are included in the program. French is the mandatory choice for any non-French speaking student. For native French speaking students, other languages are offered (Chinese, Spanish, German – list subject to change).

Hands-on Experience

30

Internship/work experience or thesis/consulting project

30

Capstone Project: 4-to 6-month internship or work experience anywhere in the world. Alternatively, students can opt for a consulting project or a thesis.

 

Please note that courses are subject to change; please check with the local contact if you have any questions.

Zoom on… Security Practitioners Colloquium

Cybersecurity is a vast and fast-paced field. To ensure that participants are exposed to the bleeding-edge issues facing practitioners, the program incorporates a Security Practitioners Colloquium.

During each session, we invite a cybersecurity practitioner to address a specific topic, including industry-specific challenges, emerging risks, and technological innovations that are shaping the industry. These sessions allow participants to connect the knowledge learned in class with the reality of the cybersecurity landscape. It is also a great opportunity for them to interact with professionals in the field and get their invaluable insights.

Additionally, students attend the FIC (International Cybersecurity Forum), where they can participate in workshops, meet vendors, and network with potential employers.

Workshops and Corporate Events

Alongside the courses, the program includes various workshops and corporate events to further develop your personal and professional skills. These cover a range of topics, such as conflict management in cross-cultural environments and intercultural communication.
Our Career Program helps participants to establish their professional career plan by working on their skills, personal strengths, and using networking tools to be prepared to meet recruiters’ expectations internationally.

Discover the Career Program

picto-partnershipPartnerships

Courses will include training material created by CISCO, a global leader in networking, through our partnership with the CISCO Networking Academy.

IÉSEG students in the Master in Cybersecurity Management will also have the opportunity to demonstrate their competence by earning two industry-recognized certifications through our partnership with CompTIA, the leading vendor-neutral IT certifying body.

All participants will take the CompTIA Security+ exam to demonstrate their cybersecurity knowledge. Each participant may take a second exam based on their preferred area of focus:
> Cybersecurity Analysis: CompTIA CySA+
> Cyber Analytics: CompTIA Data+ or DataSys+
> Cybersecurity Infrastructure: CompTIA Network+ or Linux+

Certifications have great value in the job market and are prerequisite for some positions. IÉSEG students will gain a competitive edge by earning these industry-recognized professional certifications.

Local contact

Find here your dedicated contact in your region.

General contact

Viktorija LEROY

IÉSEG's 60th Anniversary Badge