Cyber Security, Implementation and Management

Overview

This course enhances your cyber security management skills for better project outcomes, managing programs, risk management, investigations, and analysis. Learn how to implement:

  • Strategies that align with your organization’s culture
  • A compliant Information Security Management System
  • An effective Information Risk Management System
  • A business continuity and disaster recovery program
  • A Threat Risk Assessment (TRA)
  • A Privacy Impact Assessment (PIA)

 

Prerequisites

The following courses must be completed prior to registration:

 

Learning Outcomes 

The participant will be able to:
  • Evaluate organizational culture and its role in cyber security
  • Synthesize information using situational awareness
  • Develop cyber risk management strategies
  • Analyze how to apply cyber security
  • Policies, Processes, Procedures, and controls
  • Evaluate cyber security threat information platforms and other cyber security management software tools

 

Audience

  • This is an open enrollment course designed for frontline staff to senior management looking to improve their cybersecurity knowledge, skills, management, and leadership skills. Whether you work in IT, Management, Engineering, Administration, Finance or Governance, this PDI Cybersecurity Certificate will advance your career with new skills and demonstrate a commitment to your organization’s well being.

 

Duration

12 hours

 

Cost

  • Regular: $995 (plus tax)
    • As of January 2023: $1095 (plus tax)

  • SCALE AI: $497.50 (plus tax)
    • From January 2023 - March 2023: $547.50 (plus tax)

 

SCALE AI

This course is supported by SCALE AI. All persons employed in Canada are eligible to benefit from a 50% discount on enrolment fees. Please select the SCALE AI session below and register with your work email address and work mailing address. 


Featured Instructor

Alan McCafferty is a Senior Business Analyst with 25+ years of progressive experience working with public organizations, not-for-profits, start-ups, and multi-national corporations.  Educated in Canada, the USA and Europe in multiple disciplines including Engineering, Business, Risk Management, and Lean 6 Sigma, he is the author of more than 25 white papers and the recipient of the Canada Award for Excellence. During his career, Alan has led the delivery of multi-year $1 billion+, mission critical information technology projects.  As a Cyber Security SME, Alan was key in the developed of the University of Ottawa’s Professional Development Institute cyber security program and teaches several of the courses.  Alan has successfully completed IT, Security, Process, Threat Risk Assessments (TRA), Privacy Impact Assessments (PIA), health and safety projects for federal government departments, provincial healthcare organizations and national not-for-profit organizations.  As a senior consultant, he uses his Lean 6 Sigma skills, along with his risk and security experience to help organizations implement low waste, and effective lean processes in areas such as information security management systems, business continuity, department security plans, quality management systems, health, and safety management systems.

Mark Hearn is a seasoned Business Leader and technical Product Management executive, bringing technology and business together to solve market problems for over 25 years. Mark’s expertise in software security and anti-reverse engineering has helped industry leaders solve critical product security issues with innovation and minimized risk. As a product security evangelist, Mark has spoken at many industry conferences and engaged in panel discussions on the need to protect software products from attack. He is an expert on the business risks associated with reverse engineering and the critical impact that hacking could have for manufacturers, and for their customers. Mark has held executive roles in product management and strategic market development, developing expertise in both the business-critical and technical functions related to business strategy, use/abuse cases, technical requirements, competitive analysis, and security threat-risk analysis.

 

Sessions

Event CodeTitleBegin DateEnd DateTermDelivery MethodRegister to Event
S00432211ACyber Security, Implementation and Management11/14/202211/17/2022AutumnOnlineRegister to Event
S00432302ACyber Security, Implementation and Management2/27/20233/2/2023WinterOnlineRegister to Event
S00432305ACyber Security, Implementation and Management5/15/20235/18/2023SummerOnlineRegister to Event