Curriculum
Course: Comprehensive Cybersecurity Training
Login

Curriculum

Comprehensive Cybersecurity Training

Module 2: Evaluate Network Security Capabilities, Secure Communication and Assess Endpoints security capabilities

0/33

Module 3: Implement Identity and Access Management and Cryptography & Secure Solution Implementation

0/47

Module 4: Threats, Vulnerabilities, Risk & Social Engineering, Explain Vulnerability Management and Analyze indicators of Malicious activities

0/47

Module 5: Secure Cloud Network Architecture, Explain Resiliency and Site Security Concepts

0/35

Module 6: Governance, Risk and Compliance

0/56
Text lesson

Week 18.1 Data Classification and Compliance

 

Overview

This module will teach students how to recognize, classify, and protect different types of data, including personal, sensitive, and regulated information. They will explore data sovereignty and geographical considerations that impact storage and access, as well as the differences between data breaches and privacy breaches. Students will understand security compliance, monitoring, and reporting processes, and learn practical methods for data protection and loss prevention, including encryption, masking, tokenization, and DLP solutions. By the end, they will be able to assess risks, enforce policies, and put protectional safeguards in place to protect organisational data’s availability, confidentiality, and integrity.