Course name:
Data Security Compliance
Description:
This course outlines important data security measures to be taken by individuals to protect sensitive data and PI. Some of the topics include how to prevent data breaches, safeguard, protecting your personal information, and several types of breaches.
Duration:
40 Hours
Audience:
Information Security Professionals
Prerequisites:
Information Security
Course outline:
<p class="heading1-text" style="margin: 0in 0in 7.5pt; background-image: initial; background-position: initial; background-size: initial; background-repeat: initial; background-attachment: initial; background-origin: initial; background-clip: initial;"><span style="font-family: 'Verdana',sans-serif; color: #333333;">This course outlines important data security measures to be taken by individuals to protect sensitive data and PI. Some of the topics include how to prevent data breaches, safeguard, protecting your personal information, and several types of breaches. The security measures outlined in this course not only protect the individual (mobile devices, etc.) but also protect data up to the corporate level. These safe practices can prevent hacking into personal social media accounts up to hacking of sensitive corporate data and data breaches. Learn how to better protect yourself and your company by implementing these security measures into your usage.</span></p> <p>&nbsp;</p> <p>Outline -</p> <p>Module 1: Data Breaches and ID Theft</p> <p>1.1 Course Introduction</p> <p>1.2 Threat and Cost</p> <p>Module 2: Device Security Basics</p> <p>2.1 It's All About YOU- Part 1</p> <p>2.2 It's All About YOU- Part 2</p> <p>Module 3: Avoiding Inadvertent Disclosure</p> <p>3.1 No More OOps- Part 1</p> <p>3.2 No More OOps- Part 2</p> <p>Module 4: Physical And Technical Safeguards</p> <p>4.1 The DOOf Security- Part 1</p> <p>4.2 The DOOf Security - Part 2</p>

Copyright © 2011-2014 Aziksa Inc, All rights reserved.