HOME > IT & Software > Data Security strategy for organizations

Data Security strategy for organizations

SynopsisData Security strategy for organizations, available at $74.99...
Data Security strategy for organizations  No.1

Data Security strategy for organizations, available at $74.99, has an average rating of 4.63, with 75 lectures, 5 quizzes, based on 637 reviews, and has 3022 subscribers.

You will learn about Data Security Strategy Development Data Types, Classification, Lifecycle management Data regulatory requirements Data Governance and Management Data Monitoring and Incident Response Data Security Technical Controls This course is ideal for individuals who are Security (CyberSecurity) professionals or CISO, CIO, CEO or IT Senior Management or Data Governance and data security team or Cyber Security students or Security risk managers It is particularly useful for Security (CyberSecurity) professionals or CISO, CIO, CEO or IT Senior Management or Data Governance and data security team or Cyber Security students or Security risk managers.

Enroll now: Data Security strategy for organizations

Summary

Title: Data Security strategy for organizations

Price: $74.99

Average Rating: 4.63

Number of Lectures: 75

Number of Quizzes: 5

Number of Published Lectures: 75

Number of Published Quizzes: 5

Number of Curriculum Items: 80

Number of Published Curriculum Objects: 80

Original Price: $19.99

Quality Status: approved

Status: Live

What You Will Learn

  • Data Security Strategy Development
  • Data Types, Classification, Lifecycle management
  • Data regulatory requirements
  • Data Governance and Management
  • Data Monitoring and Incident Response
  • Data Security Technical Controls
  • Who Should Attend

  • Security (CyberSecurity) professionals
  • CISO, CIO, CEO
  • IT Senior Management
  • Data Governance and data security team
  • Cyber Security students
  • Security risk managers
  • Target Audiences

  • Security (CyberSecurity) professionals
  • CISO, CIO, CEO
  • IT Senior Management
  • Data Governance and data security team
  • Cyber Security students
  • Security risk managers
  • All companies rely on some sort of digital data to be able to operate, e.g. customer data, financial data, business plans. Digital Data is the most important asset and needs to be kept secure in order for any company to be successful. Whether you work for a small or large organization, an innovator company, a public company, a software as a service company or any other company with any digital transactions, data plays a vital role for that company operation. Today, no company can survive without digital data and with all cyber attacks going on, protecting data becomes more and more important.

    Securing the data is really the foundation of any information security program, and any security control implementation is done for that reason.

    Here, you will learn different data security requirements and techniques. At the end of this course, you will be able to understand what different types of data are, the importance of them for different organizations and security control requirements to protect them.

    This course will have 5 main sections as below:

    1. What are the Data Types, Data Classification, and Data Lifecycle

    2. What are the Law and Industry Regulations specific to digital data

    3. What is the Data Governance and Management

    4. What is Data Monitoring and Incident Response

    5. What are the common Data Security Technical Controls

    Course Curriculum

    Chapter 1: Introduction

    Lecture 1: Introduction

    Lecture 2: What is Digital Information?

    Lecture 3: Sensitive Data Types

    Lecture 4: What are Sensitive Identifiable Information?

    Lecture 5: Non-Public and Financial Information

    Lecture 6: Intellectual Property

    Lecture 7: Structured vs Unstructured Data

    Lecture 8: Data Classification

    Lecture 9: Data Lifecycle Management

    Lecture 10: Thank you!

    Chapter 2: Law and Industry Regulations

    Lecture 1: Section Intro – Laws and Regulations

    Lecture 2: PCI DSS (Payment Card Industry Data Security Standard)

    Lecture 3: HIPAA (Health Insurance Portability and Accountability Act)

    Lecture 4: GDPR (General Data Protection Regulation)

    Lecture 5: SOX (Sarbanes–Oxley Act)

    Lecture 6: ISO 27001

    Lecture 7: Local legislations

    Chapter 3: Data Governance and Management

    Lecture 1: Section Intro – What is Security governance

    Lecture 2: Security governance components

    Lecture 3: Security policy framework

    Lecture 4: Roles and responsibilities

    Lecture 5: Security Risk Management

    Lecture 6: What are Threats and Vulnerabilities

    Lecture 7: How security risks are calculated

    Lecture 8: Risk Management Framework

    Lecture 9: Risk Identification

    Lecture 10: Risk Assessment

    Lecture 11: Risk Response

    Lecture 12: Risk Monitoring

    Lecture 13: Third Party Risks

    Lecture 14: Security Awareness Training

    Lecture 15: Security Metrics and Improvements

    Chapter 4: Data Monitoring and Incident Response

    Lecture 1: Section Intro

    Lecture 2: Asset Management

    Lecture 3: Example of an Asset Management Tool

    Lecture 4: Structured vs Unstructured data access management and monitoring

    Lecture 5: Access Monitoring Solutions

    Lecture 6: File Access Monitoring Tool Demonstration

    Lecture 7: Data Breach and Incident Response

    Lecture 8: Incident Response Team and Process

    Lecture 9: Incident Response Panning – Preparation phase

    Lecture 10: Incident Response Panning – Identification phase

    Lecture 11: Incident Response Panning – Containment phase

    Lecture 12: Incident Response Panning – Remediation phase

    Lecture 13: Incident Response Panning – Recovery phase

    Lecture 14: Incident Response Panning – Lessons Learned phase

    Lecture 15: Incident Response Panning – Table Top Exercises

    Lecture 16: Data Breach Notification

    Chapter 5: Data Security Technical Controls

    Lecture 1: Section Intro

    Lecture 2: Access Controls

    Lecture 3: Defence in Depth

    Lecture 4: Data Security Technical Controls

    Lecture 5: Data Access Controls

    Lecture 6: Data Encryption

    Lecture 7: Data Loss Prevention

    Lecture 8: Office 365 DLP Example

    Lecture 9: Data Classification Tools

    Lecture 10: Office 365 Data Classification Portal

    Lecture 11: File Integrity Monitoring

    Lecture 12: Logging and Monitoring

    Lecture 13: Data Discovery and Protection

    Lecture 14: Thank you!

    Chapter 6: Optional Bonus Labs – Active Directory and File Audit

    Lecture 1: My Notes, Before You Begin This Lab

    Lecture 2: The Lab Environment

    Lecture 3: The Virtual Machines

    Lecture 4: Initial Configuration 1

    Lecture 5: Initial Configuration 2

    Lecture 6: ADAudit Plus Installation

    Lecture 7: ADAudit Plus Initial Configuration

    Lecture 8: Identity and Use activity Monitoring

    Lecture 9: AD Users and Groups Changes Monitoring

    Lecture 10: AD OU and GPO Monitoring

    Lecture 11: Troubleshooting ADAudit Plus

    Lecture 12: File Audit on ADAudit Plus

    Lecture 13: FIM, Analytics and Alerts – ADAudit Plus

    Instructors

  • Data Security strategy for organizations  No.2
    Rassoul Zadeh
    Author, trainer and Senior Security Expert
  • Rating Distribution

  • 1 stars: 0 votes
  • 2 stars: 5 votes
  • 3 stars: 62 votes
  • 4 stars: 223 votes
  • 5 stars: 347 votes
  • Frequently Asked Questions

    How long do I have access to the course materials?

    You can view and review the lecture materials indefinitely, like an on-demand channel.

    Can I take my courses with me wherever I go?

    Definitely! If you have an internet connection, courses on Udemy are available on any device at any time. If you don’t have an internet connection, some instructors also let their students download course lectures. That’s up to the instructor though, so make sure you get on their good side!