Data Security

Application fee : 20.56 USD

Details

Certification Body: Aegis School of Data Science & Cyber Security
Location: On-campus (India, Bengaluru)
Type: Certificate course
Coordinator: Mr. Ritin Joshi
Language: English
Course fee: 342.6 USD
Rating:
No Ratings

Gallery

Course Details

COURSE DESCRIPTION :-

In today’s hyper-connected world, data is becoming a vital asset to an organization and organizations across the globe are investing profoundly in information technology (IT). Data is the new oil, and the value of the data is so rich to organizations, organizations use data to decide on new pricing model, delivery approach and new services. Hence, it is essential to safeguard it from online criminals.

Typically, organizations focus on protecting three common elements namely people, processes, and technology. This privately protects intellectual capital, critical infrastructure, customer information, brand and proprietary information. Data security is not just important for organizations it is an essential integral process. Data protection comes into play on the personal computer, tablet, and mobile devices, which could be the next target of cybercriminals.

BACKGROUND :-

Data Security process is just one of many different ways to structure your
organization’s information security systems, broadly speaking, data security
processes are “user-centric”: they focus on questions like:
• Is this user allowed to access this data?
• Is this person authorized to be on this network?
• Is this person abusing system resources?
Which is great and necessary but struggles with many real-world issues like large organizations having hundreds or thousands of servers with haphazardly applied
permissions, antiquated user groups and gaps in knowing who is accessing what. A data-centric security model is a practical way of approaching this from a different
direction.

LEARNING OUTCOME :-

Students completing the course will be able to:
• Introduction to data lifecycle and Security
• Understand different data storage architectures and utilize them to analyze security
• Data protection and monitoring, data recovery, access security and manage

Lesson plan :-

  • Introduction to Data Lifecycle
  • Introduction to Data Security Lifecycle
  • Data Security Lifecycle - Create & Store Phase
  • Data Security Lifecycle - Use & Share Phase
  • Data Security Lifecycle - Archive & Destroy Phase
  • Data Loss Prevention and Monitoring
  • Data Security Compliance Requirements
  • Data Security Auditing and Assessment