Here's what you'll learn in this course.
Click the orange button below to get started.
-
1
Welcome!
-
2
Policies and Procedures
-
3
How to Properly Manage Sensitive Data
-
4
Security Tools
-
5
How to Respond to a Data Breach
-
6
Compliance Mandates
-
7
Conclusion
-
8
Appendix
-
9
Feedback
-
SecurityMetrics Academy Introduction Before we begin... -
Introduction Security Documentation Password Policies Limit Access Mobile Device Security Employee Training Physical Security System Configuration Policies and Procedures Quiz -
Introduction Risk Assessment and Risk Management Plan Data Encryption Data Destruction Wireless Networks (Wi-Fi) Secure Remote Access How to Properly Manage Sensitive Data Quiz -
Introduction Firewalls Anti-Virus or Anti-Malware Software Logging and Log Monitoring Data Breach Prevention Tools Vulnerability Scanning Penetration Testing Conduct Audits Security Tools Quiz -
Introduction Consequences of a Data Breach Compliance Requirements for a Data Breach Incident Response Phases What to Include in an Incident Response Plan Test Your Incident Response Plan How to Respond to a Data Breach Quiz -
Introduction PCI DSS Compliance HIPAA Compliance GDPR Compliance Compliance Mandate Quiz -
Create a Security Culture Security Budget -
Resource Recommendations Glossary -
Before you go...