IT Security Policy Review and/or Development
CSC 445
Project Summary: Looking to elevate your organization, and bring it to the next level? Bring on learners from Concordia College to be your learner-consultants, in a project-based experience. Learners will work on one main project over the experience of the semester, connecting with you as needed with virtual communication tools. Learners in this program/experience will research IT security policies at similar companies based on size and type, making recommendations accordingly. We will deliver our recommendations in a format that the employer deems most appropriate (presentation, paper, report) What can our learners do for your company? Learners in groups of 2-3 will work with your company to identify your needs and provide actionable recommendations, based on their in-depth research and analysis. Project activities that learners can complete may include, but are not limited to: identifying the vulnerabilities that exist in computing systems and computing networks identifying common human factors that can increase exposure of computing systems to risk suggesting standard technological solutions for securing computing systems and networks suggesting standard educational measures to avert vulnerabilities caused by human factors
IT Security Policy Review and/or Development
CSC 445
Project Summary: Looking to elevate your organization, and bring it to the next level? Bring on learners from Concordia College to be your learner-consultants, in a project-based experience. Learners will work on one main project over the experience of the semester, connecting with you as needed with virtual communication tools. Learners in this program/experience will research IT security policies at similar companies based on size and type, making recommendations accordingly. We will deliver our recommendations in a format that the employer deems most appropriate (presentation, paper, report) What can our learners do for your company? Learners in groups of 2-3 will work with your company to identify your needs and provide actionable recommendations, based on their in-depth research and analysis. Project activities that learners can complete may include, but are not limited to: identifying the vulnerabilities that exist in computing systems and computing networks identifying common human factors that can increase exposure of computing systems to risk suggesting standard technological solutions for securing computing systems and networks suggesting standard educational measures to avert vulnerabilities caused by human factors