dc.contributor.author |
Ponnambalam, Sem |
|
dc.contributor.author |
Mohajer, David |
|
dc.date.accessioned |
2022-03-14T18:42:16Z |
|
dc.date.available |
2022-03-14T18:42:16Z |
|
dc.date.issued |
2022 |
|
dc.identifier |
40f8c672-2cb8-4d12-8f7f-f05f7d69917a |
|
dc.identifier.uri |
https://openlibrary-repo.ecampusontario.ca/jspui/handle/123456789/1068 |
|
dc.description.sponsorship |
This project is made possible with funding by the Government of Ontario and through eCampusOntario's support of the Virtual Learning Strategy. |
|
dc.description.tableofcontents |
1. Statistics Related to Security Breaches |
|
dc.description.tableofcontents |
2. Impact of Cybercrime to an Organization |
|
dc.description.tableofcontents |
3. Cybersecurity Threats and the Threat Landscape |
|
dc.description.tableofcontents |
4. Data Breach Scenarios |
|
dc.description.tableofcontents |
5. Impact of Cybercrimes on the Victims |
|
dc.language.iso |
eng |
en_US |
dc.relation.haspart |
Instructor Resource: Case Solutions | mailto:open@ecampusontario.ca |
|
dc.rights |
OCL 1.0 | https://www.ecampusontario.ca/wp-content/uploads/2021/10/Ontario-Commons-License-1.pdf |
en_US |
dc.subject |
cybersecurity |
en_US |
dc.title |
Cybersecurity Governance : Risk Management |
en_US |
dc.type |
Other |
|
dcterms.accessRights |
Restricted Access |
en_US |
dcterms.educationLevel |
Adult and Continuing Education |
|
dc.identifier.slug |
https://openlibrary.ecampusontario.ca/catalogue/item/?id=40f8c672-2cb8-4d12-8f7f-f05f7d69917a |
|
ecO-OER.Adopted |
No |
|
ecO-OER.AncillaryMaterial |
No |
|
ecO-OER.InstitutionalAffiliation |
Sault College |
|
ecO-OER.ISNI |
0000 0000 8520 802X |
|
ecO-OER.Reviewed |
No |
|
ecO-OER.AccessibilityStatement |
Unknown |
|
lrmi.learningResourceType |
Educational Unit - Course |
|
lrmi.learningResourceType |
Educational Unit - Micro-Credential |
|
ecO-OER.POD.compatible |
No |
|
dc.description.abstract |
This online micro-credential has been designed to introduce learners to cybersecurity governance practices and environmental scans. Additionally, learners will explore general cybersecurity governance related to technical
controls, recovery protocols and vendor management. |
en_US |
dc.subject.other |
Technology |
|
ecO-OER.VLS.projectID |
CENT-755 |
|
ecO-OER.VLS.Category |
Digital Content - Create a New Online Program |
|
ecO-OER.VLS |
Yes |
|
ecO-OER.VLS |
Yes |
en_US |
ecO-OER.CVLP |
No |
|
ecO-OER.CVLP |
No |
en_US |
ecO-OER.ItemType |
Course |
|
ecO-OER.ItemType |
Micro-Credential |
|
ecO-OER.ItemType |
Assessment - Measure/Instrument |
|
ecO-OER.MediaFormat |
HTML/XML |
|
ecO-OER.MediaFormat |
Image |
|
ecO-OER.MediaFormat |
Office applications |
|
ecO-OER.MediaFormat |
PDF |
|
ecO-OER.VLS.cvlpSupported |
No |
|