Video description
4+ Hours of Video Instruction4+ hours of deep-dive training covering key system privacy and data protection concepts
Overview:
Cybersecurity is not only about preventing data breaches and hunting for attackers, it also involves many aspects of system and data privacy. With more than 4 hours of video training, System and Privacy Data Protection LiveLessons provides learners with an understanding of how to protect and store existing data, as well as understand that data confidentiality and business impacts are critical to data protection. In this course, the learner will examine multiple aspects of system privacy and data protection ranging from basic concepts to tools that are commonly used by data practitioners.
System and Privacy Data Protection LiveLessons is taught by expert trainer, author, and cybersecurity expert Aamir Lakhani using hands-on demos, in-depth discussions, and lightboard explanations. This course will cover the best practices cybersecurity fundamentals in a way that is easy to access and implement in real world situations.
Topics include:
- Data Privacy and Protection
- Risk Mitigation
- Importance of Policies, Procedures, and Controls
- Analyzing Logs and Impact Analysis
- SIEMs and Query Writing
- E-Mail Analysis
- Automation
Aamir Lakhani is a leading senior security strategist. He is responsible for providing IT security solutions to major enterprises and government organizations.
Mr. Lakhani creates technical security strategies and leads security implementation projects for Fortune 500 companies. Industries of focus include healthcare providers, educational institutions, financial institutions, and government organizations. Aamir has designed offensive counter-defense measures for the Department of Defense and national intelligence agencies. He has also assisted organizations with safeguarding IT and physical environments from attacks perpetrated by underground cybercriminal groups. His areas of expertise include cyber defense, mobile application threats, malware management, Advanced Persistent Threat (APT) research, and investigations relating to the Internet’s dark security movement.
Skill Level:
- Beginner
- Manage your security and privacy
- Protect and store existing data
- Use common tools to analyze and store logs
- Conduct impact analysis and risk mitigation
- Cybersecurity Professionals
- Anyone interested in learning cyber security fundamentals
- There is no required prerequisite
Pearson publishes expert-led video tutorials covering a wide selection of technology topics designed to teach you the skills you need to succeed. These professional and personal technology videos feature world-leading author instructors published by your trusted technology brands: Addison-Wesley, Cisco Press, Pearson IT Certification, Sams, and Que. Topics include: IT Certification, Network Security, Cisco Technology, Programming, Web Development, Mobile Development, and more. Learn more about Pearson Video training at http://www.informit.com/video.
Table of contents
- Introduction
-
Lesson 1: Data Privacy and Protection
- Learning objectives
- 1.1 Privacy vs. Security
- 1.2 Non-technical Controls
- 1.3 Classification, Ownership, Retention, and Data Types
- 1.4 Confidentiality, Legal Requirements, and Data Sovereignty
- 1.5 Data Minimization, Purpose Limitation, and NDA
- 1.6 Technical Controls
- 1.7 Encryption
- 1.8 Data Loss Prevention (DLP)
- 1.9 Data Masking and Deidentification
- 1.10 Tokenization
- 1.11 Digital Rights Management (DRM) and Watermarking
- 1.12 Geographic Access Requirements
- 1.13 Access Controls
- Lesson 2: Risk Mitigation
- Lesson 3: Importance of Policies, Procedures, and Controls
- Lesson 4: Analyzing Logs and Impact Analysis
- Lesson 5: SIEMs and Query Writing
- Lesson 6 E-Mail Analysis
-
Lesson 7: Automation
- Learning objectives
- 7.1 Workflow Orchestration
- 7.2 Security Orchestration
- 7.3 Security Orchestration, Automation, and Response (SOAR)
- 7.4 Scripting
- 7.5 Application Programming Interface (API) Integration
- 7.6 Automated Malware Signature Creation
- 7.7 Data Encrichment
- 7.8 Threat Feed Combination
- 7.9 Machine Learning
- 7.10 Security Content Automation Protocol (SCAP)
- 7.11 Continuous Integration
- 7.12 Continuous Deployment and Delivery
- Summary
Product information
- Title: System and Privacy Data Protection
- Author(s):
- Release date: January 2022
- Publisher(s): Pearson
- ISBN: 0137894570
You might also like
book
Data Privacy and GDPR Handbook
The definitive guide for ensuring data privacy and GDPR compliance Privacy regulation is increasingly rigorous around …
video
General Data Protection Regulation Foundation (GDPR F)
GDPR Foundation training enables you to learn the basic elements to implement and manage a compliance …
book
Modern Data Protection
Give your organization the data protection it deserves without the uncertainty and cost overruns experienced by …
book
Information Security Risk Management for ISO 27001/ISO 27002, third edition
Ideal for risk managers, information security managers, lead implementers, compliance managers and consultants, as well as …