Micro-credential:

Cyber Security - Defensive

Micro-credential

Technology is evolving everyday, which leaves corporations, individuals, and organizations vulnerable to security threats. With Sheridan's Cyber Security - Defensive Micro-Credential, learn the fundamental skills needed to protect your business, users, and networks. 

Be on the defence to protect your business. Enrol today. 

 

These courses are part of the Cyber Security - Defensive Program.

Course Name / Code Expected Availability Select

Compulsory Course(s)

Successfully Complete Three (3) Courses

Cybersecurity Fundamentals
Course Code:
INFO70240
Fall
Yes
Winter
Yes
Spring
Yes
Find a Class
Defensive Security 1
Course Code:
INFO70243
Fall
Yes
Winter
Yes
Spring
Yes
Find a Class
Defensive Security 2
Course Code:
INFO70244
Fall
Yes
Winter
Yes
Spring
Yes

Program Delivery

This program is delivered via online (asynchronous) classroom. 

What are Micro-Credentials?

Micro-Credentials certify an individual’s achievements in specific skill sets and differ from traditional credentials, such as degrees or diplomas. They are shorter, personalized, and enables employment in specific roles. At the end of this program, you will receive an official document credential from Sheridan Continuing & Professional Studies. 

Program Description

The need for experts with a knowledge in cybersecurity is rapidly increasing with the evolution of technology. The massive migration to work-from-home and the recent number of high profile data breaches are leaving corporations, organizations, and individuals vulnerable to malicious online activity. Enter Sheridan's Cyber Security - Defensive Micro-Credential. The need for cybersecurity professionals has never been higher, and thus, those with skills to defend computer networks has become an invaluable need. 

By the end of this program, students will be able to:

  • Create defensive networks based on industry and trends 
  • Monitor and respond to malicious activity within computer networks
  • Understand security policies and procedures and how effective (and ineffective) plans can safe (or cave) your organization 
  • Conduct forensic and incident response investigations after a breach 
  • Implement security compliance to protect infrastructures 

Be on the defence to protect your business. Enrol today. 

Recommended Program Pathway

For those just entering the program, the recommended program pathway is:

Contact Us

If you have any questions, please contact our Opportunity Centre at caps@sheridancollege.ca or 905-874-4440.

Related Story

CyberSecurity - Defensive