Lesson 1
Introduction to Data Security
This lesson provides an overview of the course including a brief introduction to data security, a brief history, when data security applies, and who it affects. Get a look at the final project.
Course
We start by exploring the concept of data governance, so that students can build the foundation for understanding, classifying, and protecting data. Students learn to navigate the variety of compliance regulations that apply to data security and create policies that prevent unauthorized disclosure of information Students focus on protecting confidentiality, integrity, and availability of data through concepts like encryption, auditing, file integrity, and backup strategies.
We start by exploring the concept of data governance, so that students can build the foundation for understanding, classifying, and protecting data. Students learn to navigate the variety of compliance regulations that apply to data security and create policies that prevent unauthorized disclosure of information Students focus on protecting confidentiality, integrity, and availability of data through concepts like encryption, auditing, file integrity, and backup strategies.
4 weeks
Real-world Projects
Completion Certificate
Last Updated November 2, 2022
No experience required
Lesson 1
Introduction to Data Security
This lesson provides an overview of the course including a brief introduction to data security, a brief history, when data security applies, and who it affects. Get a look at the final project.
Lesson 2
Data Governance
Data governance is about understanding the data in your organization, its importance, who owns it, and where it exists. This enables you to effectively manage and secure it.
Lesson 3
Data Confidentiality
In order to protect data from unauthorized access, you will need to know how to map out a storage architecture and then apply the appropriate encryption for both data at rest and in transit.
Lesson 4
Data Integrity
In order to ensure data is trustworthy within the organization, you will need to understand information rights management, access control, file integrity, and auditing.
Lesson 5
Data Availability
Through planned incident response, disaster recovery, business continuity, and backup strategy, organizations can ensure data is available when needed.
Lesson 6 • Project
Data Security Analysis in Online Payment Processing
You’ll spend a day in the life of a data security professional going through the process of establishing and implementing data security controls.
Christine Izuakor, PhD, CISSP
Founder & CEO, Cyber Pop-up
Dr. Christine Izuakor is the CEO of Cyber Pop-up, an on-demand cybersecurity platform powered by vetted cyber freelancers. She has over a decade of experience leading cybersecurity functions within Fortune 100 companies and has her PhD in Security Engineering.
Christine Izuakor, PhD, CISSP
Founder & CEO, Cyber Pop-up
Dr. Christine Izuakor is the CEO of Cyber Pop-up, an on-demand cybersecurity platform powered by vetted cyber freelancers. She has over a decade of experience leading cybersecurity functions within Fortune 100 companies and has her PhD in Security Engineering.
Get Started Today