Udacity Logo
Log InJoin for Free

Data Security

Course

We start by exploring the concept of data governance, so that students can build the foundation for understanding, classifying, and protecting data. Students learn to navigate the variety of compliance regulations that apply to data security and create policies that prevent unauthorized disclosure of information Students focus on protecting confidentiality, integrity, and availability of data through concepts like encryption, auditing, file integrity, and backup strategies.

We start by exploring the concept of data governance, so that students can build the foundation for understanding, classifying, and protecting data. Students learn to navigate the variety of compliance regulations that apply to data security and create policies that prevent unauthorized disclosure of information Students focus on protecting confidentiality, integrity, and availability of data through concepts like encryption, auditing, file integrity, and backup strategies.

Beginner

4 weeks

Real-world Projects

Completion Certificate

Last Updated November 2, 2022

Skills you'll learn:
Backup strategy • Data encryption • Security auditing • Data privacy classification
Prerequisites:
Cybersecurity fluency

Course Lessons

Lesson 1

Introduction to Data Security

This lesson provides an overview of the course including a brief introduction to data security, a brief history, when data security applies, and who it affects. Get a look at the final project.

Lesson 2

Data Governance

Data governance is about understanding the data in your organization, its importance, who owns it, and where it exists. This enables you to effectively manage and secure it.

Lesson 3

Data Confidentiality

In order to protect data from unauthorized access, you will need to know how to map out a storage architecture and then apply the appropriate encryption for both data at rest and in transit.

Lesson 4

Data Integrity

In order to ensure data is trustworthy within the organization, you will need to understand information rights management, access control, file integrity, and auditing.

Lesson 5

Data Availability

Through planned incident response, disaster recovery, business continuity, and backup strategy, organizations can ensure data is available when needed.

Lesson 6 • Project

Data Security Analysis in Online Payment Processing

You’ll spend a day in the life of a data security professional going through the process of establishing and implementing data security controls.

Taught By The Best

Photo of Christine Izuakor, PhD, CISSP

Christine Izuakor, PhD, CISSP

Founder & CEO, Cyber Pop-up

Dr. Christine Izuakor is the CEO of Cyber Pop-up, an on-demand cybersecurity platform powered by vetted cyber freelancers. She has over a decade of experience leading cybersecurity functions within Fortune 100 companies and has her PhD in Security Engineering.

The Udacity Difference

Combine technology training for employees with industry experts, mentors, and projects, for critical thinking that pushes innovation. Our proven upskilling system goes after success—relentlessly.

Demonstrate proficiency with practical projects

Projects are based on real-world scenarios and challenges, allowing you to apply the skills you learn to practical situations, while giving you real hands-on experience.

  • Gain proven experience

  • Retain knowledge longer

  • Apply new skills immediately

Top-tier services to ensure learner success

Reviewers provide timely and constructive feedback on your project submissions, highlighting areas of improvement and offering practical tips to enhance your work.

  • Get help from subject matter experts

  • Learn industry best practices

  • Gain valuable insights and improve your skills