Check out our 2025 Summer Research Symposium

IHS Main Website
Under Construction
IHS Main Website
Under Construction
  • Home
  • About Us
    • About Us
    • IHS Staff
  • Research
    • Research Symposium 2025
  • Learning Academy
    • Advanced CIP Training
    • Cross Sector Topics
    • Energy Sector
    • Healthcare Sector
    • Transportation Sector
    • Water/Wastewater Sector
    • SimTable Exercises
    • Crisis Management Tools
  • Partnerships
    • CICA
    • Energy and Chemical
    • PHEM
    • Transportation
    • Water
  • More
    • Home
    • About Us
      • About Us
      • IHS Staff
    • Research
      • Research Symposium 2025
    • Learning Academy
      • Advanced CIP Training
      • Cross Sector Topics
      • Energy Sector
      • Healthcare Sector
      • Transportation Sector
      • Water/Wastewater Sector
      • SimTable Exercises
      • Crisis Management Tools
    • Partnerships
      • CICA
      • Energy and Chemical
      • PHEM
      • Transportation
      • Water
  • Sign In
  • Create Account

  • My Account
  • Signed in as:

  • filler@godaddy.com


  • My Account
  • Sign out

Signed in as:

filler@godaddy.com

  • Home
  • About Us
    • About Us
    • IHS Staff
  • Research
    • Research Symposium 2025
  • Learning Academy
    • Advanced CIP Training
    • Cross Sector Topics
    • Energy Sector
    • Healthcare Sector
    • Transportation Sector
    • Water/Wastewater Sector
    • SimTable Exercises
    • Crisis Management Tools
  • Partnerships
    • CICA
    • Energy and Chemical
    • PHEM
    • Transportation
    • Water

Account


  • My Account
  • Sign out


  • Sign In
  • My Account

What is the Critical Infrastructure Protection for Executive Leaders Certificate?



The Critical Infrastructure Protection for Executive Leaders Course series equips professionals with the knowledge and tools to safeguard vital operations from emerging threats. Covering the intersection of cyber and physical security, these courses explore strategies for organizational integration, the role of cybersecurity in traditional security management, and the use of crisis management frameworks for resilience. Participants will also dive into cutting-edge security technologies, including drones and robots, learning about their operational benefits and regulatory considerations. Additionally, the series addresses pressing threats such as economic espionage, intellectual property theft, and insider risks, providing actionable strategies to identify vulnerabilities and enhance organizational security. Whether you're looking to strengthen existing protocols or implement new solutions, this series offers a comprehensive approach to protecting critical infrastructure.


Courses Offered

Understanding Intelligence for Risk-Based Critical Infrastructure Protection Strategies

Defense in Depth: Strategy for Proactive Cyber Security Operations to Protect Critical Infrastructur

Defense in Depth: Strategy for Proactive Cyber Security Operations to Protect Critical Infrastructur

This course introduces the role of intelligence in protecting critical infrastructure, emphasizing the intelligence cycle, situational awareness, and cognitive biases in analysis. Students will learn to develop actionable intelligence for risk-based decision-making in both public and private sector settings.

Learn More

Defense in Depth: Strategy for Proactive Cyber Security Operations to Protect Critical Infrastructur

Defense in Depth: Strategy for Proactive Cyber Security Operations to Protect Critical Infrastructur

Defense in Depth: Strategy for Proactive Cyber Security Operations to Protect Critical Infrastructur

This course introduces the principles and practical applications of the Defense-in-Depth strategy for cybersecurity, with a focus on protecting critical infrastructure (CI). As cyber threats become more sophisticated, the need for layered security has never been more urgent. Students will learn how to implement and manage comprehensive cybersecurity defenses that safeguard vital systems and data against evolving risks.

Learn More

Blending Physical & Cyber Security

Defense in Depth: Strategy for Proactive Cyber Security Operations to Protect Critical Infrastructur

Blending Physical & Cyber Security

Learners will gain an understanding of the overlap and redundancy between cyber and physical security at critical infrastructure sites, and explore available options for organizational integration.

Learners will be familiarized with how cybersecurity tools, systems, and processes can be leveraged to achieve security management objectives similar to those used in physical security.

Learn More

Crisis & Resilience Management

Crisis & Resilience Management

Blending Physical & Cyber Security

Learners will understand how to use the Crisis Management and Resilience Process as a strategic tool for protecting critical infrastructure operations.

Learn More

Security Drones & Robots

Crisis & Resilience Management

Intellectual Property Security

Learners will explore the operational advantages of using security drones and robots for tasks such as patrols, access control, vehicle inspections, and incident response. The course will cover the regulatory requirements associated with security drones and robots. Participants will also learn how to build a business case for integrating security drones and/or robots, highlighting their multi-functional value in emergency management, maintenance, and security operations.

Learn More

Intellectual Property Security

Crisis & Resilience Management

Intellectual Property Security

Learners will gain an understanding of economic espionage and intellectual property theft, including the methods employed by malicious actors. The course will cover strategies for identifying vulnerabilities and provide practical steps to safeguard organizations from these threats.

Learn More

Insider Threat Management

Insider Threat Management

Insider Threat Management

Learners will gain a solid understanding of the insider threat and how to manage it effectively. The course will explore the factors that can foster insider threats, along with early warning signs and indicators. By the end, learners will be equipped to implement strategic insider threat management to safeguard and support business operations.

Learn More

Copyright © 2025 Institute for Homeland Security - All Rights Reserved.

  • Home
  • About Us
  • IHS Staff
  • Events

This website uses cookies.

We use cookies to analyze website traffic and optimize your website experience. By accepting our use of cookies, your data will be aggregated with all other user data.

Accept