HIGHLIGHTS

Here are some of the highlights for this micro-credential.

  • No admission requirements, no application process, no pre-requisites, open to anyone

  • Learn at your own pace using a computer, tablet or smartphone

  • Take up to 90 days to complete the course

  • Receive a certificate of course completion and digital badge for successfully completing the course which can be shared on social media (e.g. LinkedIn, Facebook, Twitter), downloaded as a PDF, or even embedded in an email signature

Learning Outcomes

Upon successful completion of this micro-credential, learners should be able to:

  • Recognize sound Cybersecurity Governance Practices and Environment Scan

  • Explain General Cybersecurity Governance related to Technical Controls, Recovery Protocols, and Vendor Management

  • Plan for General Cybersecurity Governance related to Technical Controls, Recovery Protocols, and Vendor Management

  • Examine case studies related to Cybersecurity Governance

Micro-credential Overview

In this 13-hr online course, learners will explore Cybersecurity Governance Practices and Environment Scan.  They will learn how to plan for general Cybersecurity Governance related to Technical Controls, Recovery Protocols, and Vendor Management.

Review the curriculum below to see the topics covered.  

Learners who successfully complete the course will earn a digital badge and certificate of course completion that can be downloaded and shared via social media. 

You will have access to the course for 90 days to work through the content.

Curriculum

    1. Introduction from Sault College's eLearning Department

    2. Before we begin...

    3. What is asynchronous online self-directed learning?

    4. Learner Resources and Supports

    5. Technology Requirements

    6. Learner Introductions

    7. Privacy and Accessibility Policies

    8. Navigation

    9. Discussion Forum: Learner Engagement

    10. Technical Discussion Forum

    11. Frequently Asked Questions

    12. Help & Contact Information

    1. Welcome and Micro-credential Information

    2. Starting a Lesson

    3. Modes of Learning

    4. Learning Outcomes

    1. Acronyms List

    2. Terms (Within the Context of Cybersecurity)

    3. Terms (Within the Context of Cybersecurity) - Continued

    4. Reflection

    5. Videos To Watch

    1. Lesson 1: Learning Objectives

      FREE PREVIEW
    2. Lesson 1: Intro to Cybersecurity

      FREE PREVIEW
    3. Lesson 1: Quiz 1

      FREE PREVIEW
    4. Lesson 1: What Is Cybersecurity Governance?

    5. Lesson 1: Why is it Important?

    6. Lesson 1: Quiz 2

    7. Lesson 1: Explaining the Cybersecurity Problem

    8. Lesson 1: Return on Investment

    9. Lesson 1: Knowledge Check

    10. Lesson 1: Summary

    11. Lesson 1: Final Quiz

    1. Lesson 2: Learning Objectives

    2. Lesson 2: Introduction

    3. Lesson 2: Cybersecurity Governance Practices

    4. Lesson 2: Quiz 1

    5. Lesson 2: Environmental Scans and Cybersecurity Audit Preparedness

    6. Lesson 2: Technical Controls, Cyberattack Preparedness and Response Planning

    7. Lesson 2: Knowledge Check

    8. Lesson 2: Quiz 2

    9. Lesson 2: Human Resources Cybersecurity Governance Policies

    10. Lesson 2: Recovery Planning and Incident Preparedness and Action Planning

    11. Lesson 2: Vendor Management Policies

    12. Lesson 2: Knowledge Check

    13. Lesson 2: Summary

    14. Lesson 2: Final Quiz

    1. Lesson 3: Learning Objectives

    2. Lesson 3: Introduction

    3. Lesson 3: General Policy Concerns

    4. Lesson 3: Protected Data Policies

    5. Lesson 3: Quiz 1

    6. Lesson 3: Threat Prediction

    7. Lesson 3: Accidental disclosure of protected data

    8. Lesson 3: Accidental data corruption

    9. Lesson 3: Knowledge Check

    10. Lesson 3: Knowledge Check

    11. Lesson 3: Summary

    12. Lesson 3: Final Quiz

About this course

  • $129.99

Content Writers & Contributors