Cybersecurity and Compliance Foundations: A Fun Visual Learning Experience
- Created By ebrahim khaja
- Posted on September 20th, 2023
- Overview
- Prerequisites
- Audience
- Audience
- Curriculum
Description:
- This course is for professionals seeking to drive secure practices in their organizations and for professionals looking to transition into cybersecurity.
- This is a live, engaging, instructor-led course in which you will learn through visuals, real-life case studies, quizzes, and discussions.
- You will walk away with not only tips, tools, and practical advice, but also a framework for building secure products and delivering secure services.
Duration: 1 Day (or 2 Half Days)
Course Code: BDT304
Learning Objectives:
- Fundamentals of Security, Privacy, and Compliance
- CIA (Confidentiality, Integrity, Availability), Trust, and Non-Repudiation
- Networking, Cryptography, and Access Management
- Laws, Regulations, and Compliance Frameworks
- Privacy Concerns, Security Threats, and Risks
- Practical Tips, Tools, and Technologies for Risk Management
- AI: Impact on Security & Compliance and Vice Versa
- None
- Project, Program, and Delivery Leaders
- Product Leaders
- Business Professionals
- Technology Professionals
- Professionals looking to transition into cybersecurity.
- Project, Program, and Delivery Leaders
- Product Leaders
- Business Professionals
- Technology Professionals
- Professionals looking to transition into cybersecurity.
Topic Outline:
1 – Fundamentals of Security, Privacy, and Compliance
- Introduction to Security and Privacy
- Trends Driving the Demand for Security
- CIA (Confidentiality, Integrity & Availability) and T (Trust)
- Basic Terms
By the end of the session, the participant will be able to
- Explain the difference between security and privacy
- Explain the basic principles of security
- Understand compliance
2 – Networking, Cryptography, and Access Management
- Various layers of Networking with Threats, Practical Examples, and Tools
- Access Management
- Cryptography
By the end of the session, the participant will be able to
- Explain the most fundamental concepts of networking, encryption, decryption, and access management
3 – Laws, Regulations and Standards
- Factors Affecting the Regulations
- Widely Adopted Regulations
- Frameworks
- Quiz
By the end of the session, the participant will be able to
- Understand various laws, regulations, and standards impacting security and privacy
4 – Risk Management
- Risks and Risk Management
- Best Practices
- Tools and Technologies
- Real-Life Exercises
By the end of the session, the participant will be able to
- Understand various security, privacy, and compliance risks
- Demonstrate an understanding of various tools, technologies, and best practices to manage risks
Pre –reads (n/a)
5 – Cloud, AI, Disaster Recovery (DR), Business Continuity (BC), Incident Response (IR)
- Cloud Computing
- AI (Artificial Intelligence)
- Leveraging AI for security
- DR, IR, and BC
By the end of the session, the participant will be able to
- Explain cloud risks, impact of AI on security and vice versa
- Demonstrate understanding of DR, BC, and IR
Training material provided: Yes (digital format)
The curriculum is empty