Objective
Who should access your company’s data? How do you make sure that only authorized and authenticated users access the data? Cybersecurity starts with effective control over access to the information systems. Access control is an important security issue for businesses of all sizes. From the largest corporations employing specialized security controls to the salesperson on a service call opening their smartphone with a thumbprint, everyone encounters access control at some time during their workday. Access control prevents unauthorized access, records authorized access, protects the company from physical loss, and protects employees and customers from outside threats.
The course will provide employees, security, risk management, compliance, audit, and management personnel with the skills and techniques necessary to embed critical thinking skills in all aspects of access control security. The tools and techniques shared can be implemented in the access management process.
In this course, you will be asked to read through lessons, participate in learning activities, and partake in knowledge checks designed to reinforce learning followed by the end of the course final assessment.
Price: $31.98 $74.99
Use code WelComE21 and get your course at $19.99 (For Individuals). Offer valid till Jan 24.
Add to Cart For CorporatesWhat you will learn
- Learning the Access Control Models and Concepts
- Understanding the Types and Categories of Access Controls
- Understanding the Testing of Access Controls
- Learning about Access Control Attacks and Countermeasures
- Learning about Multilevel Security Models
- Learning about Authentication and Authentication Methods
- Learning about common Authentication Protocols.
Breach Notification Advanced Part II
Course Details
What you will learn
- Breach Management
- Effective Breach Response
- Data Breach Checklist
- Breach Notification Notice Content
- Notification Timelines
- Lifecycle of a Data Breach
- Public Relations Strategy
Breach Notification Awareness Part I
Course Details
What you will learn
- What is the importance of a breach notification?
- What is a data breach?
- In what circumstances would notification of a data breach be required and to whom?
- When and how should notification of a data breach be provided?
- Framework for Effective Data Breach Notification Legislation
- Timing of Notification to Affected Individuals
- Post Data Breach Immediate Action Items
- Breach Notification to Authorities
Business Continuity & Disaster Recovery Awareness Part I
Course Details
What you will learn
- Disaster
- Business Continuity and Disaster Recovery
- Use Cases
- Risks Covered by DR
- Driving Factors
- Challenges in Developing DR Plan
- Technical Challenges
- Key Factors in DR Plan
Business Continuity & Disaster Recovery Awareness Part II
Course Details
What you will learn
- Business Continuity Plan (BCP) vs Disaster Recovery (DR)
- Disaster Recovery Architecture
- Drivers for DR Architecture
- Architectural Elements
- Disaster Recovery Plan
- Backup Strategy
- Disaster Recovery Emergency Procedures
Business Continuity Disaster Recovery Part III
Course Details
What you will learn
- BCP DR Frameworks and Standards
- What is the Framework?
- What are the different BCP frameworks?
- Frameworks Explained
- ISO 22301
- National Fire Protection Association (NFPA) 1600
- FFIEC Business Continuity
- NIST 800-34
- ISO 27301
- BCP
- Good Practice Guidelines (GPG)
- Ready Gov
- COBIT
Business Continuity Disaster Recovery Part IV
Course Details
What you will learn
- Learn about what is a backup and recovery strategy
- Understand and learn to apply best practices for backup
- Learn eight different backup methods and backup hardware
- Understand what recovery is and learn about methods of recovery
- Learn about the challenges with recovery process and prioritization
Cloud Security Awareness
Course Details
What you will learn
- Cloud Security
- Cloud Basics - Cloud Concepts, Architecture and Design
- Cloud Service Models
- Cloud Risk Landscape
- Cloud Security Domains
- Cloud Data Security
- Cloud and AWS
- Cloud and Azure
- Cloud Application Security Basics
Data Privacy and Privacy Regulations Part I
Course Details
What you will learn
- Learn about Privacy Imperative
- Understand Strategic and Tactical Drivers
- Learn about Privacy Strategy and Privacy Impact
- Understand the Private Identifiable Information (PII) and Private Health Information
- (PHI) data
- Learn about Privacy Impact Assessments
- Learn about HIPAA and HITECH
- Learn about GDPR and CCPA
- Understand the Breach Notification Requirements
Data Privacy and Privacy Regulations Part II
Course Details
What you will learn
- Learn about Privacy Imperative
- Understand Strategic and Tactical Drivers
- Learn about Privacy Strategy and Privacy Impact
- Understand the Private Identifiable Information (PII) and Private Health Information
- (PHI) data
- Learn about Privacy Impact Assessments
- Learn about HIPAA and HITECH
- Learn about GDPR and CCPA
- Understand the Breach Notification Requirements
Facility Workplace Awareness Part I
Course Details
What you will learn
•Identify potential risks to workplace security
•Measures for improving workplace security
•Actions to take in response to a security situation
•Facility and Physical Security Perimeter
•Badge and Visitors Security
•Do’s and Don’ts
•Securing Devices and Data in Public
•Public Networks and Security
•Device Security
1.Laptop
2.Mobile Device Security
•Clear Desk
Need us to design a course for you? Contact Now