Pay as you go
- Maximum flexibility to learn at your own pace.
- Cancel anytime.
At 5-10 hours/week
Get access to classroom immediately on enrollment
Understanding of data privacy regulations and cybersecurity best practices.
Evaluate privacy threats; initiate the course project; analyze sensitive data types and purposes, and compare data privacy with information security.
Examine standard data privacy protection frameworks; develop data privacy governance; establish data classification and identification, and evaluate privacy risks using a Privacy Impact Assessment (PIA).
Identify requirements for the protection of personal data; compare technical security controls as they relate to data privacy; compare procedural security controls as they relate to data privacy, and evaluate data protection solutions and technologies.
Evaluate data privacy models; apply cyber hygiene best practices for privacy, and evaluate privacy controls using a data protection checklist. Additionally, identify emerging technologies and describe evolving data security laws.
In this project, students will conduct a data privacy risk and compliance assessment of the Microsoft 365 infrastructure for the case study company. They will complete the industry-standard data privacy risk assessment report documenting data management infrastructure, privacy program strategy, policies, procedures, privacy risks, and compliance gaps.
Chief Security Officer
Ron Woerner, CISSP, CISM is an internationally recognized thought leader in cybersecurity and data privacy. As CSO at Cyber-AAA, he works as a consultant/vCISO, advises leaders, and delivers training worldwide. He has several technology degrees and is passionate about building cyber professionals.
Pay as you go
Students should have a basic understanding of: