〉 The development of job-ready skills in the rising field of cyber security
〉 The best digital content with virtual labs and extensive e-library for additional online materials
〉 Interactive online workshops facilitated by cyber security experts
〉 Inspirational webinar series delivered by industry leaders
〉 A personal mentor working in the field of cyber security
〉 Team and organisation leadership skills
〉 Competency-based programme structure to support your employability
Month 1 - 6 | Online
Month 7 - 9 | Online + Amsterdam
Month 10 - 12 | Talentship/Practicum - Global
Increase of cyber threats are one of the biggest trends set to negatively impact business growth, and cyber crimes are expected to cost the world $6 trillion by 2021, up from $3 trillion in 2015. Employer demand for cyber security professionals are accelerating at an alarming pace. By following a career path in cyber security you can play a crucial role protecting your organisation from cyber risks and threats. Career opportunities includes
IT Security Analyst
Security Operations Center (SOC) Analyst
Threat Intelligence Analyst
ELU helps you prepare for the world’s hottest job by developing your technical and interpersonal skills and connecting you with employers in the Amsterdam metropolitan area.
Total duration of this programme is 12 months. You should commit 12-20 hours per week to your learning.
Apply environmental reconnaissance techniques using appropriate tools, analyzing results, and implementing recommended response
Implement vulnerability management process and analyze results of the scan
Distinguish threat data to determine incident impact and prepare a toolkit with appropriate tools and strategies
Use data to recommend remediation of security issues and recommend implementation strategy while participating in the Software Development Life Cycle (SDLC).
Engage with each other and the programme, and explore the cyber security domain and essential cyber security competencies in this module. Discover your learning preferences and practice how to work with your action learning group. Acquaint yourself with the learning tools & resources and learn how to build your professional e-portfolio to showcase your skills in cyber security for prospective employers.
Master the network security basics as well as securing files, websites, users and mail servers. Also learn how to use the tools and technologies required to deploy and troubleshoot a company’s security infrastructure.
Apply environmental reconnaissance techniques using appropriate tools and processes. Analyze the results of a network reconnaissance. Implement or recommend the appropriate response and countermeasure to a network-based threat. Explain the purpose of practices used to secure a corporate environment.
Implement an information security vulnerability management process. Analyze the output resulting from a vulnerability scan. Compare and contrast common vulnerabilities found
in an organization.
Distinguish threat data or behavior to determine the impact of an incident. Prepare a toolkit and use appropriate forensics tools during an investigation. Explain the importance of communication during the incident response process. Analyze common symptoms to select the best course of action to support incident response. Summarize the incident recovery and post-incident response process.
Explain the relationship between frameworks, common policies, controls, and procedures.
Use data to recommend remediation of security issues related to identity and access management. Review security architecture and make recommendations to implement compensating controls. Use application security best practices while participating in the Software Development Life Cycle (SDLC). Compare and contrast the general purpose and reasons for using various cybersecurity tools and technologies.
Develop self-awareness about your intentions, values and beliefs as a cyber security professional to better understand and articulate your purpose in your career. Engage in dialogic conversations in which you create opportunities for active listening and to engage and learn from each other by utilizing a relational process of peer coaching.
Get introduced to the fundamentals of team facilitation and coaching that includes skills such as creating an inclusive environment for every team member, building trust and support in the team, leading decision-making and problem-solving processes.
Adopt an organisational perspective and develop advanced-level context-sensitive skills that are required in deciding on developmental interventions. Acquire a set of techniques and tools that are intended to increase your professional impact.
Discover and discuss contemporary theories of leadership including concepts such as community leadership alongside stewardship and servant leadership that cyber security professionals can adopt within their communities.
The final project is intended to support you towards your action plans to improve your practices in your organisations. The principle question to ask is “How can I improve my practice?” With this question in mind, this module offers a practical and structured way of applying action research in your workplace. The outcome of the following modules is intended to be a submission of a work-based project along with a written report and a presentation
This quick form will help us understand whether you meet the basic requirements
If your profile is shortlisted, you are invited to an online analytical test and asked to submit a statement of motivation.
Upon enrolment we will ask for a copy of your undergraduate diploma and transcript, as well as proof of English proficiency.
– An undergraduate degree in a technical computing discipline such as computer engineering, computer science or information science
– At least 2 years of professional experience in IT and security
If you are unsure whether you meet the prerequisites for the course, please write us at email@example.com
SCIENCE PARK 408 1098 XH AMSTERDAM