Course Outline

Day 1 - Understanding Basic Security Principles and Security Threats

  1. What is information and why should it be protected?
  2. Confidentiality; integrity; availability; impact of threats and risks;
  3. Principle of least privilege; Social engineering; attack surface analysis; threat modeling
  4. Understanding physical security
  • Facility security;
  • computer security;
  • removable devices and disks;
  • access control;
  • mobile device security;
  • keyloggers

5. Understanding Internet Security

  • Browser security settings;
  • secure websites

6. Email encryption and signing and other applications; Virtual Private Network (VPN)

  • public key / private key;
  • encryption algorithms; certificate properties;
  • certification services;
  • PKI infrastructure / certification services;
  • hardware tokens, restricting devices to run only trusted applications

7. Understanding Email Protection

  • Antispam, antivirus software, spoofing, phishing and pharming;
  • client protection vs. server protection; Sender Policy Framework (SPF) records;
  • PTR records

Day 2 - Basic Principles of Personal Data Processing

 

1. Fundamentals of Protection

  • sources of national and international law
  • scope of personal data protection regulations
  • scope of authorities' powers for personal data protection
  • legal protection of the right to personal data protection
  • GDPR - basic information and definitions - selected topics
  • personal data
  • processing of personal data
  • legal basis for processing personal data
  • administrator's obligations
  • rights of individuals whose data is processed
  • administrative financial penalties
  • Personal Data Protection Act of May 10, 2018 - scope of regulations
  • appointment of a Data Protection Officer
  • procedure for violating personal data protection regulations
  • control of compliance with personal data protection regulations
  • civil, criminal and administrative liability
  • conditions for the lawfulness of processing personal data (regular and specially protected)
  • legal requirements for using the institution of entrusting personal data processing to other entities
  • data protection impact assessment
  • data protection by design, default data protection
  • legal basis for transferring personal data to a third country • data protection in employment relations

2. Information Security Management

 

  • discussion of the information security management system in the organization based on, among others, Polish standards
  • Information Security Management System (ISMS)
  • identification of privacy-related risks and their legal consequences
  • principles of risk assessment and evaluating the impact of applying certain solutions in the area of
  • effectiveness of information security management
  • how to understand and apply a risk-based approach – practical filling out of the Risk Analysis template
  • managing the lifecycle of personal data
  • Discussion of ISO 27001 requirements
  • ISO 27002:2017 guidelines as a list of best practices in the field of data and information security
  • access control,
  • cryptography,
  • physical security,
  • secure operation, including backups,
  • communication security,
  • acquisition, development, and maintenance of systems,
  • managing data and information security incidents, • business continuity management,
  • compliance with legal regulations.
  • role, tasks, and permissions of the Data Security Officer;
  • auditing data and information security systems.
 14 Hours

Number of participants


Price Per Participant (Exc. Tax)

Testimonials (5)

Provisional Courses

Related Categories