Aegis School of Business, Data Science, Cyber Security & Telecommunication
Application fee: | 20.56 USD |
Course fee: | 342.6 USD |
COURSE DESCRIPTION :-
In today’s hyper-connected world, data is becoming a vital asset to an organization and organizations across the globe are investing profoundly in information technology (IT). Data is the new oil, and the value of the data is so rich to organizations, organizations use data to decide on new pricing model, delivery approach and new services. Hence, it is essential to safeguard it from online criminals.
Typically, organizations focus on protecting three common elements namely people, processes, and technology. This privately protects intellectual capital, critical infrastructure, customer information, brand and proprietary information. Data security is not just important for organizations it is an essential integral process. Data protection comes into play on the personal computer, tablet, and mobile devices, which could be the next target of cybercriminals.
BACKGROUND :-
Data Security process is just one of many different ways to structure your
organization’s information security systems, broadly speaking, data security
processes are “user-centric”: they focus on questions like:
• Is this user allowed to access this data?
• Is this person authorized to be on this network?
• Is this person abusing system resources?
Which is great and necessary but struggles with many real-world issues like large organizations having hundreds or thousands of servers with haphazardly applied
permissions, antiquated user groups and gaps in knowing who is accessing what. A data-centric security model is a practical way of approaching this from a different
direction.
LEARNING OUTCOME :-
Students completing the course will be able to:
• Introduction to data lifecycle and Security
• Understand different data storage architectures and utilize them to analyze security
• Data protection and monitoring, data recovery, access security and manage
Lesson plan :-