Cyber & Cloud Security Program

by Robertson College Claim Listing

Providing you with the knowledge on how to keep cloud customers' and organizations' information secure by focusing on protecting valuable data and systems hosted in the Cloud.

Price : Enquire Now

Contact the Institutes

Fill this form

Advertisement

Robertson College Logo

img Duration

44 Weeks

Course Details

The Cyber & Cloud Security program will give you the tools to keep cloud customers and organizations information secure allowing you to provide the following to an organization:

  • Help the organization:
    • Determine data requirements (i.e. Credit Card data for PCI DSS compliance, Personally Identifiable Information for Privacy legislation compliance, Classified data, etc.) 
    • Understand which data must remain confidential
    • Understand which systems must maintain configuration and data integrity (such as financial systems, HR systems, e-commerce data, databases etc.)
  • Understand which systems and data must support availability requirements (uptime – e-commerce sites, critical infrastructure, services bound by Service Level Agreements or SLAs)
  • Identify vulnerabilities and potential breaches in data confidentiality, system and data integrity, data and system availability, and escalate appropriately
  • Provide security guidance to business users wanting to leverage cloud computing
  • Work with IT business process owners to create or maintain management procedures, daily operating procedures, and standards documentation to facilitate a uniform delivery of service
  • Help business understand the data life cycle (create, store, use, share, archive, destroy) and the related responsibilities of the data
  • Participate in the creation, implementation, and maintenance of the organization’s information/cybersecurity management program
  • Perform complex technical activities using cloud platforms (such as Microsoft 365 and Azure, Amazon Web Services, Google Cloud Platform) that improve confidentiality, integrity, and availability of data and related systems
  • Validate configurations of technologies support the objectives of the organization, maintaining security while controlling costs 
  • Work with cloud technology, such as software-defined networks, virtual machines, hypervisors, containers, container orchestration technologies, virtual firewalls, virtual intrusion detection systems, data loss prevention systems, file integrity monitoring systems, security information and event management systems, Windows, Linux
  • Downtown Branch

    10145 109 St NW #206, Downtown, Edmonton
  • South Portage Branch

    180 Main Street, South Portage, Winnipeg
  • Sunnyside Branch

    100 – 2912 Memorial Drive SE, Sunnyside, Calgary

Check out more Cybersecurity courses in Canada

The ISI School Logo

Computer Networks And Security

Study the different standards, topologies and models of networks, cabling and connectivity devices.

by The ISI School [Claim Listing ]
SBC (Saskatoon Business College) Logo

Cyber Security

This course is designed for you as a non-technical end user of computers, mobile devices, networks, and the Internet, to enable you to use technology more securely to minimize digital risks.

by SBC (Saskatoon Business College) [Claim Listing ]
  • Price
  • Start Date
  • Duration
College of the North Atlantic Logo

Cybersecurity For The IT Professional

Today’s digital world is a veritable playground for cybercriminals. The internet of things – auto thermostats, health trackers and other AI technologies – have opened the doors to digital interlopers and leave organizations and individuals vulnerable to invasion.

by College of the North Atlantic [Claim Listing ]
Roicians Logo

Dot Net Training

This course offers practical implementation of dot-net programming. Students will learn basic to advanced levels of programming skills from industry professionals. Along with the technical aspects, we will be preparing our students for interviews too.

by Roicians [Claim Listing ]
Kensley College Logo

Information Security Incident Handler

This course will significantly benefit incident handlers, risk assessment administrators, penetration testers, cyber forensic investigators, venerability assessment auditors, system administrators, system engineers, firewall administrators, network managers, IT managers, IT professionals and anyone

by Kensley College [Claim Listing ]

© 2024 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy