• Education
  • Research
  • Knowledge
  • Partners and Alumni
  • Plus
    • Education
    • Research
    • Knowledge
    • Partners and Alumni
  • Education
  • Research
  • Knowledge
  • Partners and Alumni
Cybersecurity professionals

Executive Master in Cybersecurity Management

Explore body of knowledge, target audience, and Hybrid education model

.

Body of knowledge

Built over six main thrusts (modules), the body of knowledge is mapped against a series of frameworks 

Target audience

Targeting future and current leaders and managers involved with Cybersecurity

Hybrid education

22

Bringing an innovative Hybrid education model, Participants work on their own pace gaining experience and knowledge. 

Below you find some alumni news and blog

Body of knowledge

Information Security Leadership 

(the CISO Fundamentals)

Security Controls

Governance, Risk, Compliance and Certification

Security Architecture

Securing the Landscape

Security Operations: Continuity and Crisis Management

Cybersecurity Battleground: Threats, Vulnerabilities and Technologies

Cybersecurity Battleground: Threats, Vulnerabilities and Technologies

Cybersecurity Battleground: Threats, Vulnerabilities and Technologies

Cybersecurity Battleground: Threats, Vulnerabilities and Technologies

Cybersecurity Battleground: Threats, Vulnerabilities and Technologies

General Management: Digital and Cybersecurity Leadership

Cybersecurity Battleground: Threats, Vulnerabilities and Technologies

General Management: Digital and Cybersecurity Leadership

Mapped againstvarious frameworks


To ensure comprehensiveness and relevance

EMCM alignment with the SFIA Foundation

The SFIA Foundation is a global not-for-profit organisation




EMCM alignment with the SFIA Foundation.  The SFIA Foundation is a global not-for-profit organisation which oversees the production and use of the Skills Framework for the Information Age.




EMCM alignment with NIST CSF.  The Cybersecurity Framework (CSF) 2.0 is designed to help organizations of all sizes and sectors — including industry, government, academia, and nonprofit — to manage and reduce their cybersecurity risks. It is useful regardless of the maturity level and technical sophistication of an organization’s cybersecurity programs. 





EMCM Alignment with COBIT 19.  Effective governance over information and technology is critical to business success, and this new release further cements COBIT’s continuing role as an important driver of innovation and business transformation. 




EMCM Alignment with the Cybok. The CyBOK project aims to bring cyber security into line with the more established sciences by distilling knowledge from major internationally-recognised experts to form a Cyber Security Body of Knowledge that will provide much-needed foundations for this emerging topic. 








EMCM alignment with the ENISA ECSF. The ECSF provides an open tool to build a common understanding of the cybersecurity professional role profiles in Europe and common mappings with the appropriate skills and competences required. 

Blended learning method


To suit professionals from all around Europe

Part 1 (Acquire in an offline learning mode): Guided pre-reading and self research weeks

Part 2 (Evaluate) A short self-evaluation survey to check the readiness for the In-person classes.

Part 3 (Build expertise) Attend onsite classes and workshops

Part 4 (Group Case study) in small teams 

Part 5 (Final delivery) 

Intended audience


Suited for various ambitious professionals

    News from the 2023' Cycle

    • Education
    • Research
    • Knowledge
    • Privacy Policy

    Digital Governance and Trust Academy

    Avenue Louise - Louizalaan 500, 1050 Brussels, Brussels-Capital, Belgium

    +3223403202

    Copyright © 2025 Digital Governance and Trust Academy - Tous droits réservés.

    Optimisé par

    Ce site Web utilise les cookies.

    Nous utilisons des cookies pour analyser le trafic du site Web et optimiser votre expérience du site. Lorsque vous acceptez notre utilisation des cookies, vos données seront agrégées avec toutes les autres données utilisateur.

    RefuserAccepter