Cybersecurity, also known as Information Security, is the protection of data and personally identifiable information from malicious attacks, theft, and destruction. Failures of cybersecurity policies, both in large corporations and governmental agencies, have earned significant visibility and negative publicity in recent months and years. As the amount of data being stored continues to increase, and as hackers become more sophisticated, the need for cybersecurity is greater than ever.
40 course hours
This course requires a basic understanding of IT concepts
Register for the full certificate or complete each course as a stand-alone learning opportunity.
Communications and Network Security: it begins with a lesson in the different types of networks and different transmission technologies. It also covers the two main models that govern how networks work: the OSI model and the TCP/IP model, as well as their related layers. The course includes a detailed discussion of the many protocols that allow networks and network devices to communicate with one another and includes a discussion of firewalls and wireless networks. This course is designed for IT professionals and other adult learners who are interested in gaining an introduction to information technology security.
Asset Security: Companies must protect their assets. Just as locks go on the doors to protect physical assets, electronic and data assets must also be guarded. Asset security involves the full support of everyone in an organization, from corporate-level personnel down to front-line employees. Various security controls will be described that help protect privacy, along with data leakage prevention (DLP).
Security and Risk Management: this course covers the role of governance and risk management in information security. It looks at the policies and standards that are needed to operate an effective information security function and to oversee good information security practices. The course also includes a look at how modern organizations manage information security risks and how to conduct a risk analysis. It concludes by examining the process for providing information security training and education.
Security Engineering: This course contains an introduction to the key concepts of cryptography and security engineering. It examines the role of encryption in information security and considers common encryption methods. In addition, the course discusses ciphers, their substitutes, and how they work. Public key infrastructure and management is also covered.
Identity and Access Management: this course introduces students to the principles of access controls, beginning with the central modes of information security and continuing through various attacks and defenses. The course presents different kinds of authentication techniques, how they work, and how they are distinguished from each other.
Security Assessment and Testing: focusing on potential disruptions that can affect organizations and how they can be addressed with assessments and plans. Learners will have the opportunity to practice how to assess the impact of disasters that may arise as well as to develop their own versions of these plans.
Security Operations: a detailed overview of security operations: administrative controls, trusted recovery and change and incident management. This course establishes a foundation in auditing, monitoring, and detection in information security.
Software Development Security: while focusing on the systems development life cycle, operating systems, and their environments. Additional topics include the role of various databases in security and how to recognize and guard against attacks on software. Students will have the opportunity to apply application security controls.
Course work is available online 24/7
Once you begin the certificate, you will have one year to complete it
All software resources are available within each online course
How to Register:
Registration is available online 24/7. Both Visa and Mastercard payments are accepted. If you are a business or organization looking to register one or more employees, contact us for information on setting up a Company Profile.
- Click to Register Now
- Select desired courses and add to cart
- Create an/Sign into account
- Click Checkout, follow prompts
- You are done!
You have questions, we have answers. Contact us by extended [dot] ed [at] rdpolytech [dot] ca (email) or call 403.356.4900