System and Privacy Data Protection

Video description

4+ Hours of Video Instruction

4+ hours of deep-dive training covering key system privacy and data protection concepts

Overview:

Cybersecurity is not only about preventing data breaches and hunting for attackers, it also involves many aspects of system and data privacy. With more than 4 hours of video training, System and Privacy Data Protection LiveLessons provides learners with an understanding of how to protect and store existing data, as well as understand that data confidentiality and business impacts are critical to data protection. In this course, the learner will examine multiple aspects of system privacy and data protection ranging from basic concepts to tools that are commonly used by data practitioners.

System and Privacy Data Protection LiveLessons is taught by expert trainer, author, and cybersecurity expert Aamir Lakhani using hands-on demos, in-depth discussions, and lightboard explanations. This course will cover the best practices cybersecurity fundamentals in a way that is easy to access and implement in real world situations.

Topics include:
  • Data Privacy and Protection
  • Risk Mitigation
  • Importance of Policies, Procedures, and Controls
  • Analyzing Logs and Impact Analysis
  • SIEMs and Query Writing
  • E-Mail Analysis
  • Automation
About the Instructor

Aamir Lakhani is a leading senior security strategist. He is responsible for providing IT security solutions to major enterprises and government organizations.

Mr. Lakhani creates technical security strategies and leads security implementation projects for Fortune 500 companies. Industries of focus include healthcare providers, educational institutions, financial institutions, and government organizations. Aamir has designed offensive counter-defense measures for the Department of Defense and national intelligence agencies. He has also assisted organizations with safeguarding IT and physical environments from attacks perpetrated by underground cybercriminal groups. His areas of expertise include cyber defense, mobile application threats, malware management, Advanced Persistent Threat (APT) research, and investigations relating to the Internet’s dark security movement.

Skill Level:
  • Beginner
Learn How To:
  • Manage your security and privacy
  • Protect and store existing data
  • Use common tools to analyze and store logs
  • Conduct impact analysis and risk mitigation
Who Should Take This Course:
  • Cybersecurity Professionals
  • Anyone interested in learning cyber security fundamentals
Course Requirements:
  • There is no required prerequisite
About Pearson Video Training:

Pearson publishes expert-led video tutorials covering a wide selection of technology topics designed to teach you the skills you need to succeed. These professional and personal technology videos feature world-leading author instructors published by your trusted technology brands: Addison-Wesley, Cisco Press, Pearson IT Certification, Sams, and Que. Topics include: IT Certification, Network Security, Cisco Technology, Programming, Web Development, Mobile Development, and more. Learn more about Pearson Video training at http://www.informit.com/video.

Table of contents

  1. Introduction
    1. System and Privacy Data Protection: Introduction
  2. Lesson 1: Data Privacy and Protection
    1. Learning objectives
    2. 1.1 Privacy vs. Security
    3. 1.2 Non-technical Controls
    4. 1.3 Classification, Ownership, Retention, and Data Types
    5. 1.4 Confidentiality, Legal Requirements, and Data Sovereignty
    6. 1.5 Data Minimization, Purpose Limitation, and NDA
    7. 1.6 Technical Controls
    8. 1.7 Encryption
    9. 1.8 Data Loss Prevention (DLP)
    10. 1.9 Data Masking and Deidentification
    11. 1.10 Tokenization
    12. 1.11 Digital Rights Management (DRM) and Watermarking
    13. 1.12 Geographic Access Requirements
    14. 1.13 Access Controls
  3. Lesson 2: Risk Mitigation
    1. Learning objectives
    2. 2.1 Business Impact and Risk Calculation
    3. 2.2 Communication Risk Factors and Risk Prioritization
    4. 2.3 System Assessments
    5. 2.4 Compensating Controls and Training - Part 1
    6. 2.5 Compensating Controls and Training - Part 2
    7. 2.6 Supply Chain Assessment
  4. Lesson 3: Importance of Policies, Procedures, and Controls
    1. Learning objectives
    2. 3.1 Frameworks
    3. 3.2 AUP, Password Policies, Data Ownership, and Other Procedures
    4. 3.3 Control Types
    5. 3.4 Audits and Assessments
  5. Lesson 4: Analyzing Logs and Impact Analysis
    1. Learning objectives
    2. 4.1 Event Logs
    3. 4.2 Syslogs
    4. 4.3 Firewall Logs
    5. 4.4 Web Application Firewall (WAF)
    6. 4.5 Proxy
    7. 4.6 Intrusion Detection and Prevention (IDS/IPS)
    8. 4.7 Impact Analysis
    9. 4.8 Organizations Impact vs. Localized Impact
    10. 4.9 Immediate vs. Total
  6. Lesson 5: SIEMs and Query Writing
    1. Learning objectives
    2. 5.1 Security Information and Event Management (SIEM) - Part 1
    3. 5.2 Security Information and Event Management (SIEM) - Part 2
    4. 5.3 Rule Writing
    5. 5.4 Known-bad Internet Protocol (IP)
  7. Lesson 6 E-Mail Analysis
    1. Learning objectives
    2. 6.1 Malicious Payload
    3. 6.2 Domain Keys Identified Mail (DKIM)
    4. 6.3 Domain-based Message
    5. 6.4 Embedded Links
    6. 6.5 Impersonation
    7. 6.6 Header
  8. Lesson 7: Automation
    1. Learning objectives
    2. 7.1 Workflow Orchestration
    3. 7.2 Security Orchestration
    4. 7.3 Security Orchestration, Automation, and Response (SOAR)
    5. 7.4 Scripting
    6. 7.5 Application Programming Interface (API) Integration
    7. 7.6 Automated Malware Signature Creation
    8. 7.7 Data Encrichment
    9. 7.8 Threat Feed Combination
    10. 7.9 Machine Learning
    11. 7.10 Security Content Automation Protocol (SCAP)
    12. 7.11 Continuous Integration
    13. 7.12 Continuous Deployment and Delivery
  9. Summary
    1. System and Privacy Data Protection: Summary

Product information

  • Title: System and Privacy Data Protection
  • Author(s): Aamir Lakhani
  • Release date: January 2022
  • Publisher(s): Pearson
  • ISBN: 0137894570