BUSM70328
Data Security for Small and Medium Sized Businesses
Sheridan
 
  I: Administrative Information   II: Course Details   III: Topical Outline(s)  Printable Version
 

Land Acknowledgement

Sheridan College resides on land that has been, and still is, the traditional territory of several Indigenous nations, including the Anishinaabe, the Haudenosaunee Confederacy, the Wendat, and the Mississaugas of the Credit First Nation. We recognize this territory is covered by the Dish with One Spoon treaty and the Two Row Wampum treaty, which emphasize the importance of joint stewardship, peace, and respectful relationships.

As an institution of higher learning Sheridan embraces the critical role that education must play in facilitating real transformational change. We continue our collective efforts to recognize Canada's colonial history and to take steps to meaningful Truth and Reconciliation.


Section I: Administrative Information
  Total hours: 10.0
Credit Value: 1.0
Credit Value Notes: TBD
Effective: Spring/Summer 2021
Prerequisites: N/A
Corequisites: N/A
Equivalents: N/A
Pre/Co/Equiv Notes: N/A

Program(s): Cyber Secure Your Business
Program Coordinator(s): N/A
Course Leader or Contact: N/A
Version: 20210517_00
Status: Approved (APPR)

Section I Notes: This course is offered online. Access to the course materials will be available on Sheridan's Learning and Teaching Environment (SLATE). Online learning often involves assigned weekly readings, research, assignments, quizzes, and interactive and engaging activities such as discussion board participation and journal writing. Some courses may include live online class sessions which will involve learner participation. Students will need reliable access to a computer and the internet.

 
 
Section II: Course Details

Detailed Description
Students explore data security concepts as they relate to small and medium sized businesses (SMBs). Students learn how to secure business data, applicable regulations, and considerations for cloud hosted data. This course is intended for entrepreneurs who may not have specific technical experience.

Program Context

 
Cyber Secure Your Business Program Coordinator(s): N/A
Sheridan's Cyber Secure your Business program offers small and medium-sized businesses (SMBs) leaders the skills to help keep businesses safe. Using the Get Cyber Safe guide - a Government of Canada cybersecurity guide for SMBs, you will explore how to identify and mitigate threats and vulnerabilities in key areas of the business.


Course Critical Performance and Learning Outcomes

  Critical Performance:
At the completion of the course, students will be able to demonstrate knowledge in how to secure data in a small and medium sized business, how to determine what data needs to be secured, and how to secure data in a cloud environment.
 
Learning Outcomes:

To achieve the critical performance, students will have demonstrated the ability to:

  1. Classify data and determine the application of security controls required.
  2. Distinguish regulatory requirements related to protected and financial data, along with retention requirements affected by the data security lifecycle.
  3. Differentiate how data security requirements and implementations differ in cloud environments vs. on-premise environments.

Evaluation Plan
Students demonstrate their learning in the following ways:

 Evaluation Plan: ONLINE
 2 Quizzes100.0%
Total100.0%

Evaluation Notes and Academic Missed Work Procedure:
TEST AND ASSIGNMENT PROTOCOL The following protocol applies to every course offered by Continuing and Professional Studies. 1. Students are responsible for staying abreast of test dates and times, as well as due dates and any special instructions for submitting assignments and projects as supplied to the class by the instructor. 2. Students must write all tests at the specified date and time. Missed tests, in-class/online activities, assignments and presentations are awarded a mark of zero. The penalty for late submission of written assignments is a loss of 10% per day for up to five business days (excluding Sundays and statutory holidays), after which, a grade of zero is assigned. Business days include any day that the college is open for business, whether the student has scheduled classes that day or not. An extension or make-up opportunity may be approved by the instructor at his or her discretion.

Provincial Context
The course meets the following Ministry of Colleges and Universities requirements:


 

Essential Employability Skills
Essential Employability Skills emphasized in the course:

  • Communication Skills - Respond to written, spoken, or visual messages in a manner that ensures effective communication.
  • Critical Thinking & Problem Solving Skills - Use a variety of thinking skills to anticipate and solve problems.
  • Information Management Skills - Analyze, evaluate, and apply relevant information from a variety of sources.
  • Information Management - Locate, select, organize and document information using appropriate technology and information systems.
  • Personal Skills - Manage the use of time and other resources to complete projects.
  • Personal Skills - Take responsibility for one's own actions, decisions, and consequences.

Prior Learning Assessment and Recognition
PLAR Contact (if course is PLAR-eligible) - Office of the Registrar

  • Not Eligible for PLAR

 
 
Section III: Topical Outline
Some details of this outline may change as a result of circumstances such as weather cancellations, College and student activities, and class timetabling.
Instruction Mode: Online
Professor: N/A
Resource(s): N/A
Applicable student group(s): CAPS
Course Details:

Module 1: Data Classification & Security

·       Data classification

·       How classification impacts data security

·       Securing data in-transit and at rest

                (Evaluation Quiz 1)

Module 2: Regulatory Requirements & Cloud

·       Data retention requirements

·       Regulatory requirements for protected data

·       Considerations for cloud data storage

                (Evaluation Quiz 2)

 



Sheridan Policies

It is recommended that students read the following policies in relation to course outlines:

  • Academic Integrity
  • Copyright
  • Intellectual Property
  • Respectful Behaviour
  • Accessible Learning
All Sheridan policies can be viewed on the Sheridan policy website.

Appropriate use of generative Artificial Intelligence tools: In alignment with Sheridan's Academic Integrity Policy, students should consult with their professors and/or refer to evaluation instructions regarding the appropriate use, or prohibition, of generative Artificial Intelligence (AI) tools for coursework. Turnitin AI detection software may be used by faculty members to screen assignment submissions or exams for unauthorized use of artificial intelligence.

Course Outline Changes: The information contained in this Course Outline including but not limited to faculty and program information and course description is subject to change without notice. Nothing in this Course Outline should be viewed as a representation, offer and/or warranty. Students are responsible for reading the Important Notice and Disclaimer which applies to Programs and Courses.


[ Printable Version ]

Copyright © Sheridan College. All rights reserved.