Learn the basics of information security and what you need to know to be compliant with data protection regulations

What you will learn

Physical and logical security and the relevant methods with which this can be achieved.

Auditing and accountability so that any actions are monitored and tracked.

File and folder permissions to help keep sensitive data from falling into the wrong hands

Dealing with external staff and contractors, who can often start working for an organisation on short notice

Reporting obligations and what information you would need to provide on such a report

Description

Over this course, we’ll be covering some of the basics surrounding information security, and what you need to know in order to be compliant with most of the world’s data protection policies, as well as some of the different ways in which data can be secured.

Course topics include the following:

* Physical and logical security and the relevant methods with which this can be achieved.

* Auditing and accountability so that any actions are monitored and tracked.

* Data retention policies so that data is only held for as long as it is needed.

* File and folder permissions to help keep sensitive data from falling into the wrong hands

* Activity logs and alerts to help identify any security threats and prevent future ones.

* Dealing with external staff and contractors, who can often start working for an organisation on short notice

* Data protection and compliance and what you need to know in order to best protect your company

* How to deal with any security breaches that may arise

* Reporting obligations and what information you would need to provide on such a report

* An overview of root cause analysis, so that you know what caused a security incident in the first place.

Note that the contents of this course are intended as general guidance and not legal advice. If in doubt, speak to your company’s IT security department for specific information regarding your organisation’s policies and procedures.

English

Language

Content

Introduction


Subscribe to latest coupons on our Telegram channel.

Introduction

Information security overview

Physical and logical security

Physical security

Logical security

Auditing, accountability and data retention

Auditing and accountability

Data retention policies

Permissions, activity logs and alerts

File and folder permissions

Activity logs and alerts

External staff, data protection & compliance

External staff and contractors

Data protection and compliance

Security breaches, reporting & root cause analysis

Security breaches

Reporting obligations

Root cause analysis