Cyber & Cloud Security Program

by Robertson College Claim Listing

Providing you with the knowledge on how to keep cloud customers' and organizations' information secure by focusing on protecting valuable data and systems hosted in the Cloud.

Price : Enquire Now

Contact the Institutes

Fill this form

Advertisement

Robertson College Logo

img Duration

44 Weeks

Course Details

The Cyber & Cloud Security program will give you the tools to keep cloud customers and organizations information secure allowing you to provide the following to an organization:

  • Help the organization:
    • Determine data requirements (i.e. Credit Card data for PCI DSS compliance, Personally Identifiable Information for Privacy legislation compliance, Classified data, etc.) 
    • Understand which data must remain confidential
    • Understand which systems must maintain configuration and data integrity (such as financial systems, HR systems, e-commerce data, databases etc.)
  • Understand which systems and data must support availability requirements (uptime – e-commerce sites, critical infrastructure, services bound by Service Level Agreements or SLAs)
  • Identify vulnerabilities and potential breaches in data confidentiality, system and data integrity, data and system availability, and escalate appropriately
  • Provide security guidance to business users wanting to leverage cloud computing
  • Work with IT business process owners to create or maintain management procedures, daily operating procedures, and standards documentation to facilitate a uniform delivery of service
  • Help business understand the data life cycle (create, store, use, share, archive, destroy) and the related responsibilities of the data
  • Participate in the creation, implementation, and maintenance of the organization’s information/cybersecurity management program
  • Perform complex technical activities using cloud platforms (such as Microsoft 365 and Azure, Amazon Web Services, Google Cloud Platform) that improve confidentiality, integrity, and availability of data and related systems
  • Validate configurations of technologies support the objectives of the organization, maintaining security while controlling costs 
  • Work with cloud technology, such as software-defined networks, virtual machines, hypervisors, containers, container orchestration technologies, virtual firewalls, virtual intrusion detection systems, data loss prevention systems, file integrity monitoring systems, security information and event management systems, Windows, Linux
  • Downtown Branch

    10145 109 St NW #206, Downtown, Edmonton
  • South Portage Branch

    180 Main Street, South Portage, Winnipeg
  • Sunnyside Branch

    100 – 2912 Memorial Drive SE, Sunnyside, Calgary

Check out more Cybersecurity courses in Canada

Technologia IT Group Inc Logo

Cybersecurity: Learning How Network Technologies Work

Be able to describe the operation and use of different network technologies.

by Technologia IT Group Inc [Claim Listing ]
Network Expert Inc. Logo

Palo Alto Certified Network Security Engineer

Configure and manage the essential features of Palo Alto Networks® Next Generation firewalls

by Network Expert Inc. [Claim Listing ]
CPA Alberta Logo

Cyber Security Essentials And Implementation

Utilizing practical and cost-effective ways to better safeguard your business, employees, and clients With the skills you gain in this course, you will be able to implement cybersecurity essentials all business owners, managers, and employees need to know, put into place, and practice.

by CPA Alberta [Claim Listing ]
  • Price
  • Start Date
  • Duration
Global Knowledge Logo

Cybersecurity Fundamentals

This cybersecurity course gives you a holistic perspective on the challenges of designing a secure system, touching on all the roles needed to deliver a cohesive security solution. 

by Global Knowledge [Claim Listing ]
ETS Formation Logo

Demystifying Cybersecurity (The Top 10 Risks And Threats)

Become familiar with the threats and risks that are at our doors from the moment we are connected to a network, on the Web or in connection with social networks.

by ETS Formation [Claim Listing ]

© 2024 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy