Udacity Logo
Log InSign Up

Data Security

Course

We start by exploring the concept of data governance, so that students can build the foundation for understanding, classifying, and protecting data. Students learn to navigate the variety of compliance regulations that apply to data security and create policies that prevent unauthorized disclosure of information Students focus on protecting confidentiality, integrity, and availability of data through concepts like encryption, auditing, file integrity, and backup strategies.

We start by exploring the concept of data governance, so that students can build the foundation for understanding, classifying, and protecting data. Students learn to navigate the variety of compliance regulations that apply to data security and create policies that prevent unauthorized disclosure of information Students focus on protecting confidentiality, integrity, and availability of data through concepts like encryption, auditing, file integrity, and backup strategies.

4 weeks

Real-world Projects

Completion Certificate

Last Updated November 2, 2022

Prerequisites:

No experience required

Course Lessons

Lesson 1

Introduction to Data Security

This lesson provides an overview of the course including a brief introduction to data security, a brief history, when data security applies, and who it affects. Get a look at the final project.

Lesson 2

Data Governance

Data governance is about understanding the data in your organization, its importance, who owns it, and where it exists. This enables you to effectively manage and secure it.

Lesson 3

Data Confidentiality

In order to protect data from unauthorized access, you will need to know how to map out a storage architecture and then apply the appropriate encryption for both data at rest and in transit.

Lesson 4

Data Integrity

In order to ensure data is trustworthy within the organization, you will need to understand information rights management, access control, file integrity, and auditing.

Lesson 5

Data Availability

Through planned incident response, disaster recovery, business continuity, and backup strategy, organizations can ensure data is available when needed.

Lesson 6 • Project

Data Security Analysis in Online Payment Processing

You’ll spend a day in the life of a data security professional going through the process of establishing and implementing data security controls.

Taught By The Best

Photo of Christine Izuakor, PhD, CISSP

Christine Izuakor, PhD, CISSP

Founder & CEO, Cyber Pop-up

Dr. Christine Izuakor is the CEO of Cyber Pop-up, an on-demand cybersecurity platform powered by vetted cyber freelancers. She has over a decade of experience leading cybersecurity functions within Fortune 100 companies and has her PhD in Security Engineering.

Taught By The Best

Photo of Christine Izuakor, PhD, CISSP

Christine Izuakor, PhD, CISSP

Founder & CEO, Cyber Pop-up

Dr. Christine Izuakor is the CEO of Cyber Pop-up, an on-demand cybersecurity platform powered by vetted cyber freelancers. She has over a decade of experience leading cybersecurity functions within Fortune 100 companies and has her PhD in Security Engineering.

Get Started Today

Data Security