Icon info
EN
https://www.antwerpmanagementschool.be/en
Home
https://www.antwerpmanagementschool.be/en/program
Programs
https://www.antwerpmanagementschool.be/en/program/master-class-cyber-security-architecture-technologies
Master Class Cyber Security Architecture & Technologies
https://www.antwerpmanagementschool.be/en/program/master-class-cyber-security-architecture-technologies/program
Program

Master Class Cyber Security Architecture & Technologies

Risk, Security and Privacy in the Digital Enterprise. This Master Class addresses the core elements of cyber security from an architecture and technology point of view. Covering tactical and operational aspects of the profession, it will support you in the successful implementation of tactical and operational cyber security and risk management practices into your organization.

Language

English

Duration

1 - 10 days
Price
€7.200

Location

Antwerp, Belgium

Language

English

Duration

1 - 10 days
Price
€7.200

Location

Antwerp, Belgium
https://www.antwerpmanagementschool.be/en
Home
https://www.antwerpmanagementschool.be/en/program
Programs
https://www.antwerpmanagementschool.be/en/program/master-class-cyber-security-architecture-technologies
Master Class Cyber Security Architecture & Technologies
https://www.antwerpmanagementschool.be/en/program/master-class-cyber-security-architecture-technologies/program
Program

Program

Practical information

Start date: 02 October 2025


Thursdays: 14h - 22h, incl. dinner.
Fridays: 09h - 17h incl. lunch.

Curriculum

This Master Class is structured around 6 chapters addressing the core elements of cyber security from an architecture and technology point of view. Covering tactical and operational aspects of the profession, it will support you in the successful implementation of tactical and operational cyber security and risk management practices into your organization.

In each chapter, models and concepts are explained and illustrated through cases and exercises. All in-class sessions will be highly interactive, with a lot of focus on sharing experiences and challenging ideas.

  1. Cyber Security Management
    • Cyber & Business Information Security gaining insights into strategic topics such as regulations, trends, strategic objectives and develop those into security goals and objectives. Key topics are:
      • Understanding the strategic content and stakeholders;
      • Formulating a risk & security strategy;
      • Understand the key drivers for digital assurance (risk, security & compliance);
      • Frameworks for digital governance, management and assurance.
    • Managing Cyber Risks & Threats by gaining insights into the variety of cyber risks, threats, trends, actors, tooling and techniques.
      • Identification of relevant cyber threats and taxonomy;
      • Maturity assessment methods.
  2. Cyber Security Architecture & Technologies
    • Security architecture understanding of the key concepts, best practice architectural frameworks, standards and protocols.
      Key topics are:
      • Zero Trust architecture technology;
      • Identify main security architecture frameworks (SABSA, NIST, CSA, …);
      • Orchestration and automation (SOAR);
      • Continuous delivery (CI/CD) and automation;
      • Internet of things and smart devices (OT & IoT)
    • Agile Secure Development understanding the main principles, stages and techniques for agile secure lifecycle management.
      Key topics are:
      • Agile Developments & manifests;
      • Software security fundamentals and frameworks;
      • Measures in the software security development lifecycle.
  3. Security Operations
    • Implementing & maintaining information security processes & structures in practice. Key topics are:
      • Frameworks such as ISF, PCI, DSS, NIST,... and operational aspects
    • Security operations processes (Maturity modelling). Key topics are:
      • Managing, supporting and reporting audit findings;
      • Statements and certifications (SOC2, ISAE).

  4. Cyber Incident Management
    • Understanding and practicing the process of identifying, managing, recording and analyzing security threats or incidents in real-time. Key topics are:
      • Security Operations Centers (SOC);
      • MITRE Attack framework;
      • Threat modelling and intelligence gathering;
      • Security Orchestration, Automation & Response (SOAR);
      • Machine Learning and Artificial Intelligence in Cyber.
  5. Legal & Privacy
    • Understand the ethics and legal implications of ethical hacking. Key topics are:
      • Main regulations for cyber security and digital assurance;
      • EU data privacy directives (GDPR);
      • Cloud Directives;
      • Privacy aspects in intelligence gathering;
      • Artificial Intelligence ethics and regulations.
  6. Soft Skills and Leadership
    • Develop the necessary soft skills in order to establish the plan, execute it and embed it with all stakeholders. Key topics are:
      • Stakeholder analysis;
      • Interpersonal communication skills;
      • Presentation & persuasion.

Learning objectives

After attending this program, participants have further developed their professional knowledge and experience in:

  • Cyber & Business Information Security: gain insights into strategic topics such as regulations, trends, strategic objectives and develop those into security goals and objectives;
  • Managing Cyber Risks & Threats: gain insights into the variety of cyber risks, threats, trends, actors, tooling and techniques;
  • Cyber Security Architecture: acquire understanding of the key concepts of security architecture, incorporating best practice architectural frameworks and standards;
  • Agile Secure Development: understanding the main principles, stages and techniques for agile secure lifecycle management;
  • Cyber Security Processes & Structures: acquire understanding of security management system frameworks and associated objectives and controls;
  • Cyber Incident Management: understand and practice the process of identifying, managing, reporting and analyzing security threats or incidents;
  • Cyber Security Legal & Privacy regulations: understand the ethics and legal implications of ethical hacking;
  • Develop and practice interpersonal communication, presentation and persuasion skills in order to establish commitment for your security & assurance plan, get it executed and embed it with all stakeholders.

Faculty

Our experienced faculty will coach and assist you during this program. All of them have an academic career (master, PhD or DBA) and international experience in terms of career, research, project management, advisory boards and/or consulting. Many of them have published about their practice-based research, business cases and management experiences. Our faculty are experts in executive education, tailor-made programs and business consultancy.

Start the registration procedure

We only accept a limited number of candidates. We advise you to start the noncommittal application process as soon as possible. Registrations will be closed once the maximum capacity has been reached.

Barbara LR square

A question about this program?

Function Program Director Digital Transformation
Barbara LR square
Close

A question about this program?