Data Privacy Principles
Explore best practices and procedures for managing privacy, security, and risk and assessing security processes. This course covers data privacy and protection practices, risk management, and security frameworks.Information Management Guidelines
The IM principles training focuses on guidelines, procedures, and controls that are required for the technology teams to effectively implement security governance within the organization.Cyber Security Fundamentals
Learn the fundamentals of cyber security, data privacy, global laws and regulations including most noted cyber breaches, security risks, security technologies, and the best security practices. Global Laws and Regulations
Being compliant with applicable laws and regulations is one of the four major goals of an information security program. Because of the growing importance of information security, there are many laws and regulations, and we can expect more to emerge in the coming years. This course outlines a few of the more common laws and regulations you're likely to find in multinational organizations. Cyber Threat Intelligence
According to NIST, a cyber-threat is, "Any circumstance "or event with the potential to adversely impact "organizational operations, organizational assets, "individuals, or other organizations through "an information system via unauthorized access, "destruction, disclosure, modification of information, "and/or denial of service." Learn how cyber-criminals take advantage of vulnerabilities in technologies, processes, and humans in order to cause damage.Security Governance Expert
Security governance helps organizations minimize information risks and costs while maximizing their value. This course covers developing policies, business cases, implementing an information security strategy, developing a governance framework, and other key components of a security governance program.