Please use this identifier to cite or link to this item: https://openlibrary-repo.ecampusontario.ca/jspui/handle/123456789/1068
Full metadata record
DC FieldValueLanguage
dc.contributor.authorPonnambalam, Sem-
dc.contributor.authorMohajer, David-
dc.date.accessioned2022-03-14T18:42:16Z-
dc.date.available2022-03-14T18:42:16Z-
dc.date.issued2022-
dc.identifier40f8c672-2cb8-4d12-8f7f-f05f7d69917a-
dc.identifier.urihttps://openlibrary-repo.ecampusontario.ca/jspui/handle/123456789/1068-
dc.description.sponsorshipThis project is made possible with funding by the Government of Ontario and through eCampusOntario's support of the Virtual Learning Strategy.-
dc.description.tableofcontents1. Statistics Related to Security Breaches-
dc.description.tableofcontents2. Impact of Cybercrime to an Organization-
dc.description.tableofcontents3. Cybersecurity Threats and the Threat Landscape-
dc.description.tableofcontents4. Data Breach Scenarios-
dc.description.tableofcontents5. Impact of Cybercrimes on the Victims-
dc.language.isoengen_US
dc.relation.haspartInstructor Resource: Case Solutions | mailto:open@ecampusontario.ca-
dc.rightsOCL 1.0 | https://www.ecampusontario.ca/wp-content/uploads/2021/10/Ontario-Commons-License-1.pdf-
dc.rightsOCL 1.0 | https://www.ecampusontario.ca/wp-content/uploads/2021/10/Ontario-Commons-License-1.pdfen_US
dc.subjectcybersecurity-
dc.titleCybersecurity Governance : Risk Managementen_US
dc.typeOther-
dcterms.accessRightsRestricted Access-
dcterms.educationLevelAdult and Continuing Education-
dc.identifier.slughttps://openlibrary.ecampusontario.ca/catalogue/item/?id=40f8c672-2cb8-4d12-8f7f-f05f7d69917a-
ecO-OER.AdoptedNo-
ecO-OER.AncillaryMaterialNo-
ecO-OER.InstitutionalAffiliationSault College-
ecO-OER.ISNI0000 0000 8520 802X-
ecO-OER.ReviewedNo-
ecO-OER.AccessibilityStatementUnknown-
lrmi.learningResourceTypeEducational Unit - Course-
lrmi.learningResourceTypeEducational Unit - Micro-Credential-
ecO-OER.POD.compatibleNo-
dc.description.abstractThis online micro-credential has been designed to introduce learners to cybersecurity governance practices and environmental scans. Additionally, learners will explore general cybersecurity governance related to technical controls, recovery protocols and vendor management.en_US
dc.subject.otherTechnology-
ecO-OER.VLS.projectIDCENT-755-
ecO-OER.VLS.CategoryDigital Content - Create a New Online Program-
ecO-OER.VLSYes-
ecO-OER.VLSYesen_US
ecO-OER.CVLPNo-
ecO-OER.CVLPNoen_US
ecO-OER.ItemTypeCourse-
ecO-OER.ItemTypeMicro-Credential-
ecO-OER.ItemTypeAssessment - Measure/Instrument-
ecO-OER.MediaFormatHTML/XML-
ecO-OER.MediaFormatImage-
ecO-OER.MediaFormatOffice applications-
ecO-OER.MediaFormatPDF-
ecO-OER.VLS.cvlpSupportedNo-
Appears in Collections:VLS Collection

Files in This Item:
File SizeFormat 
D2LExport42785SA-MCCB200-MASTER202222323 2.zip
  Restricted Access
18.49 MBzipView/Open Request a copy


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.