Loading...

Course description

Learn about effective leadership in the field of information security and gain an elevated understanding of security operations concepts and how to apply them in real-world situations. You will discover how to apply concepts using best practices in vendor procurement, investigations and preventative measures, resource management, disaster recovery and business continuity.

Learner outcomes

Upon completion of this course, students will be able to
  • identify key control technologies and their role in day-to-day operations. 
  • describe necessary operations in maintaining key controls to protect assets. 
  • create incident plans, including forensic considerations. 
  • prioritize operations, articulate progress/opportunity for improvement and introduce methodical processes. 
  • identify key concepts in recovery, disaster planning, business continuity planning and personnel safety. 
  • integrate security roles within the software development lifecycle. 

Notes

Students must enrol in all three courses in the Advanced Cyber Security program at the same time.

Please contact CE Registration Services to register. 

Phone: 403.440.3833 or 1.877.287.8001

Email: ceregservices@mtroyal.ca

 

 

Loading...
This course is not currently open for registration. If you have any questions, please contact us at ceregservices@mtroyal.ca.
Required fields are indicated by .