Loading...

Course description

Learn how to mitigate risk and protect ownership of vulnerable digital data by understanding best practices for data-gathering, classification, storage, retention and protection.

Learner outcomes

Upon completion of this course, students will be able to
  • apply the controls used to manage the identity lifecycle.
  • assess methods to authenticate users and devices (things) to access varying levels of sensitive data. 
  • apply concepts to authenticate 3rd parties.
  • select and implement identity and access provisioning concepts. 
  • evaluate access control attacks and identify relevant mitigating controls.
  • describe the benefits, options and provider models for Identity as a Service (IDaaS). 

Notes

Students must enrol in all three courses in the Cyber Security Fundamentals program at the same time.

Please contact CE Registration Services to register. 

Phone: 403.440.3833 or 1.877.287.8001

Email: ceregservices@mtroyal.ca

 

Prerequisites

XCYS 10002 - Info Security Risk Management with a minimum grade of D
Loading...

Thank you for your interest in our programming. There are no sections of this course currently scheduled; however, we update our schedules regularly. 

  • New spring and summer schedules can be viewed starting the first Monday in March
  • New winter schedules can be viewed starting the first Monday in November.
  • New fall schedules can be viewed starting the first Monday in June.

Check back later or select the “Request Information” button below to be notified when registration is available.

This course is not currently open for registration. If you have any questions, please contact us at ceregservices@mtroyal.ca.
Required fields are indicated by .