Cybersecurity: A Systems Approach

  • Overview
  • Course Content
  • Requirements & Materials

Cybersecurity: A Systems Approach

Course Description

As many business sectors become increasingly information centric and network reliant, cybersecurity is becoming a critical pillar of the enterprise. Cybersecurity: A Systems Approach explores information security vulnerabilities and how to approach cybersecurity resilience as a complex system. Examine effective frameworks for assessing and managing information security within an enterprise architecture, approaching challenges from a top-down systems engineering approach. Practice newly learned techniques through workshop exercises that explore topics such as identifying vulnerabilities, defining threats, assessing risk, and designing a security plan.

Course Content


  • Confidentiality, integrity, availability
  • Identification, authentication, authorization, and audit
  • Identify, protect, detect, respond, and recover


  • Requirements analysis
  • System analysis control
  • Functional analysis
  • Design synthesis


  • Attack surface
  • Threat actors and threat vectors
  • Stages of attack
  • Modern malware
  • Insider threat


  • Secure software design
  • Defensive technologies
  • Business continuity planning
  • Cryptography
  • Penetration testing


  • Risk management frameworks
  • Systems engineering approach to design secure systems
Requirements & Materials


  • Downloadable course content will be available in the Canvas LMS

Session Details

  • Special Discounts: Georgia Tech Research Institute (GTRI) employees are eligible to receive a discount.  If you are a GTRI employee, please go to the Organizational Development website and look for the coupon code under GT Professional Development. Review coupon instructions for more information.

Who Should Attend

This course is designed for managers, engineers, and other technical professionals with growing responsibility for cybersecurity design, administration, management, or network administration. It also applies to professionals in government or data-rich industries, such as energy, finance, healthcare and defense, whose roles are highly impacted by the security of data, as well as professionals moving into cybersecurity roles.

Coding boot camp professional working on laptop

What You Will Learn

  • Information security principles
  • Systems engineering approach
  • Vulnerabilities, threats, and exploitations
  • Protections and defenses
  • Cryptography
  • Risk reduction
Cybersecurity professional working on computer

How You Will Benefit

  • Develop foundational knowledge of the principles of information security and the nature of cyber defense.
  • Understand how systems engineering processes are effectively applied to securing complex, connected systems.
  • Develop a linkage between enterprise architecture and business processes.
  • Learn techniques for evaluating threats and risk so that you can make proactive decisions to reduce the impact of security breaches.
  • Develop and practice your skills for assessing risk/threats, designing a security plan and providing a path for business continuity in the event of a security incident.
  • Grow Your Professional Network icon
    Grow Your Professional Network
  • Taught by Experts in the Field icon
    Taught by Experts in the Field

The course schedule was well-structured with a mix of lectures, class discussions, and hands-on exercises led by knowledgeable and engaging instructors.

- Abe Kani


We enable employers to provide specialized, on-location training on their own timetables. Our world-renowned experts can create unique content that meets your employees' specific needs. We also have the ability to deliver courses via web conferencing or on-demand online videos. For 15 or more students, it is more cost-effective for us to come to you.

  • Save Money
  • Flexible Schedule
  • Group Training
  • Customize Content
  • On-Site Training
  • Earn a Certificate
Learn More

Want to learn more about this course?