Pre-order rate: USD49

Standard rate: USD139

*7% GST  on above rates is applicable for Singapore residents.

Certified Academy

Data Security and Privacy: Safeguarding Your Customer’s Data

Tackling the biggest problem in the digital age – data privacy



REGISTER NOW
TBA
Online
USD 49
YES

About the course:

Cybercrime and data breach can often be seen on the news nowadays along with unscrupulous data practices that have jeopardised valuable customer information that has eroded customer trust and loyalty in brands. Organisations have the responsibility to protect customer data. In order to gaining customer’s trust, organisations need to implement stronger customer data protection practices and policies and revise them periodically. Even though this is one of the responsibilities of the IT department, those who are handling customer data on a daily basis should also learn this set of skills as well in order to fully understand how to safely handle customer data.  

This course aims to provide audience with information on how to enhance the competencies of data protection and compliance officers on how to effectively assess risks as well as to implement and sustain their data protection management programme.  

Who should attend?

  • Anyone who might not be responsible for data protection, but handles customer data such as their personal information and user behaviour on a day-to-day basis. 

Key learning outcomes:

  • Understanding the mentality of hackers to prevent hacking incidents 
  • Enhance competencies of local data protection 
  • Gaining a fundamental understanding on GDPR 
  • Differentiate the various forms of malware and how it could affect computers and networks 
  • Learn how to safely store and dispose of data  

Course content

  • 8+ hours of on-demand training and instruction videos 
  • Flexible and mobile learning mode 
  • 100% online course 
  • Certificate upon completion of a post-course evaluation


Course Syllabus

Module  1

GDPR Guidelines

This module examines the fundamentals of the General Data Protection Regulation law on data privacy and protection.  

  • Overview of GDPR guidelines
  • Gaining a fundamental understanding on GDPR 
  • Is GDPR a privacy or security regulation? Why do companies focus on GDPR compliance
  • Enhance competencies of local data protection
  • Differentiate the various forms of malware and how it could affect computers and networks
Module  2

Data Governance

Examine the process of managing the availability, usability, integrity and security of data in order to ensure its consistency and trustworthy.

  • Overview of data governance
  • Developing Data Governance Framework
  • Standards for Data Governance
  • Aligning Data and Corporate Strategy 
Module  3

Learn the fundamentals of how hackers hack

Getting into a hacker’s mentality could help evaluate and identify vulnerabilities in networks and system infrastructure.  

  • Understanding the mentality of hackers to prevent hacking incidents
  • Vulnerability Management
  • Ethical Hacking/ Penetration Testing
  • Hacking Methodology
Module  4

Cyber warfares and cyber attacks against companies (Case study)

This module looks into case studies on how cyber attacks happen and how it could be prevented. 

Module  5

Cloud and Encryption

Understanding the risks of cloud storage and explore how you could enhance cloud security through encryption.  

  • Storage options in the Cloud
  • What are the risks of data storage in the cloud
  • Discussion of the major cloud providers and storage 
  • Encryption in the cloud 
Module  6

Data Hygiene

This module examines the importance of data hygiene and cleansing to improve data quality.

  • Data Lifecycle
  • Data Hygiene and its impact on productivity
  • Data Access
  • Data Collection
  • Data Retention
  • Secure Disposal Data
Module  7

Threat Detection and Monitoring

Explore the multifaceted concept of threat detection to prepare your organisation for known and unknown threats.

  • Define a Threat 
  • Log & Alert Management
  • Active vs Passive Monitoring 
  • Defense in Depth – Network Security
  • Security Information and Event Management
  • Software

How does this online course work?

Real life best practices
We show real case studies, techniques and methods used by experienced specialists
Optimisation of learning
The course is based on the principle: Know-See-Do, according to which the completion of each individual modules enables the quick implementation of specific activities in practice
Practical application
Apply what you learn to real-life solutions straight away with guidance from our detailed teaching materials and video recording
Learn on the go
Materials are available 24/7 on our dedicated platform. Access your course any time, anywhere
Certification of course completion
The certificate issued confirms the knowledge acquired by the participant and documents the participant’s professional development, and is available in a digital format for print or download.
Top expert
  • World-class knowledge
  • Quality study materials
  • Practical exercises
  • Frequently Asked Questions

     

    What background knowledge is necessary?

    None! This course is appropriate for anyone interested in learning more about cybersecurity and data privacy.

    Are there any dates for in-person meetings?

    No, there are no in-person meetings at an indicated place for this course. The whole course is based on online learning through an interactive educational platform. By joining the course, you gain access to all materials, video lectures, and online presentations.

    Will I receive a certificate after completing the course?

    Yes, at the end of the course, each participant will receive a certificate confirming the participation and completion of the course.