SlideShare a Scribd company logo
PREPARE
The Emergency Management Cybersecurity graduate certificate
program is designed to prepare decision makers to address the
growing challenges of managing effective cybersecurity practices
and mitigating threats within private and public organizations.
DEFEND
The program is the first of its kind to offer an interdisciplinary
approach to cybersecurity including legal ramifications, technologies,
risk assessment, response, and implementation for any organization
concerned about cyber vulnerabilities.
RESPOND
Gain the skills necessary to communicate effectively about
cybersecurity to technical and non-technical individuals at all levels
of an organization.
RECOVER
Learn to develop business continuity and recovery strategies that
identify mission essential functions, time critical tasks, and legal
ramifications to address both attacks and natural disasters.				
GRADUATE CERTIFICATE IN
EMERGENCY MANAGEMENT CYBERSECURITY
DEPARTMENT OF
CRIMINAL JUSTICE
LEARN ONLINE AND
IN LAS VEGAS
Combining the flexibility of online courses
with a one-week capstone session in Las
Vegas, this program is designed for
professionals responsible for leading teams
to address cyber vulnerabilities. The
capstone includes industry exposure at a
conference such as Black Hat or DefCon.
COURSE REQUIREMENTS
To meet the program requirements students
must complete four courses and a one-week
onsite session (12 credits total).
ECM 700 Introduction to Cybersecurity
ECM 702 Cyber Law-Digital Intellectual
Property & Privacy
ECM 710 Crisis &Emergency
Management
ECEM 735 Concept Implementation &
Cyber Lab
Application deadline: July 1
To learn more, please contact us at
ecem@unlv.edu

More Related Content

Similar to Cybersecurity flyer march 28

DataShepherd Security
DataShepherd SecurityDataShepherd Security
DataShepherd Security
Jason Newell
 
cyber-security-brochure
cyber-security-brochurecyber-security-brochure
cyber-security-brochure
Nick Serafimov
 
Introduction-to-Cyber-Security-Training.pptx
Introduction-to-Cyber-Security-Training.pptxIntroduction-to-Cyber-Security-Training.pptx
Introduction-to-Cyber-Security-Training.pptx
056kevinChauhan
 
Empowering Employees for Cyber Resilience: A Guide to Strengthening Your Orga...
Empowering Employees for Cyber Resilience: A Guide to Strengthening Your Orga...Empowering Employees for Cyber Resilience: A Guide to Strengthening Your Orga...
Empowering Employees for Cyber Resilience: A Guide to Strengthening Your Orga...
Richard Lawson
 
Two-Factor Authentication (2FA)
Two-Factor Authentication (2FA)Two-Factor Authentication (2FA)
Two-Factor Authentication (2FA)
kamranrazzaq8
 
How to Forge a Robust Cybersecurity Framework_ Addressing the Gaps in Approac...
How to Forge a Robust Cybersecurity Framework_ Addressing the Gaps in Approac...How to Forge a Robust Cybersecurity Framework_ Addressing the Gaps in Approac...
How to Forge a Robust Cybersecurity Framework_ Addressing the Gaps in Approac...
Toronto Innovation College
 
6 Strategies to Prevent a Ransomware Attack.ppt
6 Strategies to Prevent a Ransomware Attack.ppt6 Strategies to Prevent a Ransomware Attack.ppt
6 Strategies to Prevent a Ransomware Attack.ppt
cybernewslive
 
Employee Cybersecurity Training
Employee Cybersecurity TrainingEmployee Cybersecurity Training
Employee Cybersecurity Training
kamranrazzaq8
 
How to Forge a Robust Cybersecurity Framework_ Addressing the Gaps in Approac...
How to Forge a Robust Cybersecurity Framework_ Addressing the Gaps in Approac...How to Forge a Robust Cybersecurity Framework_ Addressing the Gaps in Approac...
How to Forge a Robust Cybersecurity Framework_ Addressing the Gaps in Approac...
Toronto Innovation College
 
Course factsheet - AXELOS RESILIA Practitioner
Course factsheet - AXELOS RESILIA PractitionerCourse factsheet - AXELOS RESILIA Practitioner
Course factsheet - AXELOS RESILIA Practitioner
Matt Trigg
 
Understanding the Importance of Security Testing in Safeguarding Your Digital...
Understanding the Importance of Security Testing in Safeguarding Your Digital...Understanding the Importance of Security Testing in Safeguarding Your Digital...
Understanding the Importance of Security Testing in Safeguarding Your Digital...
Afour tech
 
Ecem flyer march 28 (1)
Ecem flyer march 28 (1)Ecem flyer march 28 (1)
Ecem flyer march 28 (1)
Erika Schumacher
 
Incident Handler Certification
Incident Handler CertificationIncident Handler Certification
Incident Handler Certification
SagarNegi10
 
Cyber Security and Digital Forensics, BSc(Hons) (ESOFT) 2022-23 (1).doc
Cyber Security and Digital Forensics, BSc(Hons) (ESOFT) 2022-23 (1).docCyber Security and Digital Forensics, BSc(Hons) (ESOFT) 2022-23 (1).doc
Cyber Security and Digital Forensics, BSc(Hons) (ESOFT) 2022-23 (1).doc
ThowfeekFayees
 
Malware Analyst: Guardians Of The Digital Realm
Malware Analyst: Guardians Of The Digital RealmMalware Analyst: Guardians Of The Digital Realm
Malware Analyst: Guardians Of The Digital Realm
FredReynolds2
 
Amer resume
Amer resume Amer resume
Amer resume
amer alrajab
 
CRISC – Certified in Risk & Information Systems Control| Virtual and Classroom
CRISC – Certified in Risk & Information Systems Control| Virtual and ClassroomCRISC – Certified in Risk & Information Systems Control| Virtual and Classroom
CRISC – Certified in Risk & Information Systems Control| Virtual and Classroom
Bharathi Grover
 
Integrating Security Across SDLC Phases
Integrating Security Across SDLC PhasesIntegrating Security Across SDLC Phases
Integrating Security Across SDLC Phases
Ishrath Sultana
 
Cybersecurity.pdf
Cybersecurity.pdfCybersecurity.pdf
Cybersecurity.pdf
PetaBytz Technologies
 
Get training in cyber security & place yourself in good companies through...
Get training in cyber security & place yourself in good companies through...Get training in cyber security & place yourself in good companies through...
Get training in cyber security & place yourself in good companies through...
CCI Training Center
 

Similar to Cybersecurity flyer march 28 (20)

DataShepherd Security
DataShepherd SecurityDataShepherd Security
DataShepherd Security
 
cyber-security-brochure
cyber-security-brochurecyber-security-brochure
cyber-security-brochure
 
Introduction-to-Cyber-Security-Training.pptx
Introduction-to-Cyber-Security-Training.pptxIntroduction-to-Cyber-Security-Training.pptx
Introduction-to-Cyber-Security-Training.pptx
 
Empowering Employees for Cyber Resilience: A Guide to Strengthening Your Orga...
Empowering Employees for Cyber Resilience: A Guide to Strengthening Your Orga...Empowering Employees for Cyber Resilience: A Guide to Strengthening Your Orga...
Empowering Employees for Cyber Resilience: A Guide to Strengthening Your Orga...
 
Two-Factor Authentication (2FA)
Two-Factor Authentication (2FA)Two-Factor Authentication (2FA)
Two-Factor Authentication (2FA)
 
How to Forge a Robust Cybersecurity Framework_ Addressing the Gaps in Approac...
How to Forge a Robust Cybersecurity Framework_ Addressing the Gaps in Approac...How to Forge a Robust Cybersecurity Framework_ Addressing the Gaps in Approac...
How to Forge a Robust Cybersecurity Framework_ Addressing the Gaps in Approac...
 
6 Strategies to Prevent a Ransomware Attack.ppt
6 Strategies to Prevent a Ransomware Attack.ppt6 Strategies to Prevent a Ransomware Attack.ppt
6 Strategies to Prevent a Ransomware Attack.ppt
 
Employee Cybersecurity Training
Employee Cybersecurity TrainingEmployee Cybersecurity Training
Employee Cybersecurity Training
 
How to Forge a Robust Cybersecurity Framework_ Addressing the Gaps in Approac...
How to Forge a Robust Cybersecurity Framework_ Addressing the Gaps in Approac...How to Forge a Robust Cybersecurity Framework_ Addressing the Gaps in Approac...
How to Forge a Robust Cybersecurity Framework_ Addressing the Gaps in Approac...
 
Course factsheet - AXELOS RESILIA Practitioner
Course factsheet - AXELOS RESILIA PractitionerCourse factsheet - AXELOS RESILIA Practitioner
Course factsheet - AXELOS RESILIA Practitioner
 
Understanding the Importance of Security Testing in Safeguarding Your Digital...
Understanding the Importance of Security Testing in Safeguarding Your Digital...Understanding the Importance of Security Testing in Safeguarding Your Digital...
Understanding the Importance of Security Testing in Safeguarding Your Digital...
 
Ecem flyer march 28 (1)
Ecem flyer march 28 (1)Ecem flyer march 28 (1)
Ecem flyer march 28 (1)
 
Incident Handler Certification
Incident Handler CertificationIncident Handler Certification
Incident Handler Certification
 
Cyber Security and Digital Forensics, BSc(Hons) (ESOFT) 2022-23 (1).doc
Cyber Security and Digital Forensics, BSc(Hons) (ESOFT) 2022-23 (1).docCyber Security and Digital Forensics, BSc(Hons) (ESOFT) 2022-23 (1).doc
Cyber Security and Digital Forensics, BSc(Hons) (ESOFT) 2022-23 (1).doc
 
Malware Analyst: Guardians Of The Digital Realm
Malware Analyst: Guardians Of The Digital RealmMalware Analyst: Guardians Of The Digital Realm
Malware Analyst: Guardians Of The Digital Realm
 
Amer resume
Amer resume Amer resume
Amer resume
 
CRISC – Certified in Risk & Information Systems Control| Virtual and Classroom
CRISC – Certified in Risk & Information Systems Control| Virtual and ClassroomCRISC – Certified in Risk & Information Systems Control| Virtual and Classroom
CRISC – Certified in Risk & Information Systems Control| Virtual and Classroom
 
Integrating Security Across SDLC Phases
Integrating Security Across SDLC PhasesIntegrating Security Across SDLC Phases
Integrating Security Across SDLC Phases
 
Cybersecurity.pdf
Cybersecurity.pdfCybersecurity.pdf
Cybersecurity.pdf
 
Get training in cyber security & place yourself in good companies through...
Get training in cyber security & place yourself in good companies through...Get training in cyber security & place yourself in good companies through...
Get training in cyber security & place yourself in good companies through...
 

Recently uploaded

Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
Nicholas Montgomery
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
amberjdewit93
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
Colégio Santa Teresinha
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
Nicholas Montgomery
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
Jean Carlos Nunes Paixão
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
David Douglas School District
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
Dr. Shivangi Singh Parihar
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
PECB
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
Celine George
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
heathfieldcps1
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
Scholarhat
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
IreneSebastianRueco1
 
Smart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICTSmart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICT
simonomuemu
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
Dr. Mulla Adam Ali
 
Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Excellence Foundation for South Sudan
 

Recently uploaded (20)

Film vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movieFilm vocab for eal 3 students: Australia the movie
Film vocab for eal 3 students: Australia the movie
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
 
writing about opinions about Australia the movie
writing about opinions about Australia the moviewriting about opinions about Australia the movie
writing about opinions about Australia the movie
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
 
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
ISO/IEC 27001, ISO/IEC 42001, and GDPR: Best Practices for Implementation and...
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
How to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold MethodHow to Build a Module in Odoo 17 Using the Scaffold Method
How to Build a Module in Odoo 17 Using the Scaffold Method
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
 
Azure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHatAzure Interview Questions and Answers PDF By ScholarHat
Azure Interview Questions and Answers PDF By ScholarHat
 
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
RPMS TEMPLATE FOR SCHOOL YEAR 2023-2024 FOR TEACHER 1 TO TEACHER 3
 
Smart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICTSmart-Money for SMC traders good time and ICT
Smart-Money for SMC traders good time and ICT
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
 
Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.Types of Herbal Cosmetics its standardization.
Types of Herbal Cosmetics its standardization.
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
 

Cybersecurity flyer march 28

  • 1. PREPARE The Emergency Management Cybersecurity graduate certificate program is designed to prepare decision makers to address the growing challenges of managing effective cybersecurity practices and mitigating threats within private and public organizations. DEFEND The program is the first of its kind to offer an interdisciplinary approach to cybersecurity including legal ramifications, technologies, risk assessment, response, and implementation for any organization concerned about cyber vulnerabilities. RESPOND Gain the skills necessary to communicate effectively about cybersecurity to technical and non-technical individuals at all levels of an organization. RECOVER Learn to develop business continuity and recovery strategies that identify mission essential functions, time critical tasks, and legal ramifications to address both attacks and natural disasters. GRADUATE CERTIFICATE IN EMERGENCY MANAGEMENT CYBERSECURITY DEPARTMENT OF CRIMINAL JUSTICE LEARN ONLINE AND IN LAS VEGAS Combining the flexibility of online courses with a one-week capstone session in Las Vegas, this program is designed for professionals responsible for leading teams to address cyber vulnerabilities. The capstone includes industry exposure at a conference such as Black Hat or DefCon. COURSE REQUIREMENTS To meet the program requirements students must complete four courses and a one-week onsite session (12 credits total). ECM 700 Introduction to Cybersecurity ECM 702 Cyber Law-Digital Intellectual Property & Privacy ECM 710 Crisis &Emergency Management ECEM 735 Concept Implementation & Cyber Lab Application deadline: July 1 To learn more, please contact us at ecem@unlv.edu