Thank you for sending your enquiry! One of our team members will contact you shortly.
Thank you for sending your booking! One of our team members will contact you shortly.
Course Outline
Day 1 - Understanding Basic Security Principles and Threats
- What is information and why should it be protected?
- Confidentiality; Integrity; Availability; Impact of threats and risk;
- Principle of least privilege; Social engineering; attack surface analysis; threat modeling
- Understanding physical security
- Physical security;
- computer security;
- removable devices and disks;
- access control;
- mobile device security;
- keyloggers
5. Understanding Internet Security
- Browser security settings;
- secure websites
6. Encryption and Email Signing, as well as Other Applications; Virtual Private Network (VPN)
- public key / private key;
- encryption algorithms; certificate properties;
- certification authorities;
- PKI infrastructure / certification services;
- hardware tokens, device restrictions to run only trusted applications
7. Understanding Email Protection
- Anti-spam, antivirus software, spoofing, phishing, and pharming;
- client protection vs. server protection; Sender Policy Framework (SPF) records;
- PTR records
Day 2 - Basic Principles of Personal Data Processing
1. Fundamentals of Protection
- Sources of national and international law
- Scope of application of personal data protection regulations
- Powers of the data protection authority
- Judicial protection of the right to personal data protection
- GDPR - basic information and definitions - selected issues
- Personal data
- Processing of personal data
- Legal basis for processing personal data
- Obligations of the controller
- Rights of individuals whose data is processed
- Administrative fines
- Act on Personal Data Protection of 10 May 2018 - scope of regulations
- Appointment of a Data Protection Officer
- Procedure for investigating personal data protection violations
- Compliance with personal data protection regulations
- Civil, criminal, and administrative liability
- Conditions for the lawful processing of personal data (ordinary and special categories)
- Legal requirements for entrusting personal data processing to other entities
- Data protection impact assessment
- Data protection by design, data protection by default
- Legal basis for transferring personal data to third countries • Personal data protection in employment relationships
2. Information Security Management
- Discussion of the information security management system in an organization based on, among others, Polish standards
- Information Security Management System (ISMS)
- Identification of privacy risks and their legal consequences
- Risk assessment principles and evaluation of the impact of applying specific solutions in terms of
- Effectiveness of security management
- How to understand and apply a risk-based approach – practical completion of the Risk Analysis template
- Managing the data lifecycle
- Discussion of ISO 27001 requirements
- Guidelines from ISO 27002:2017 as a list of best practices in data and information security
- Access control,
- Cryptography,
- Physical security,
- Secure operations, including backups,
- Communication security,
- Acquisition, development, and maintenance of systems,
- Data and information security incident management, • Business continuity management,
- Compliance with legal requirements.
- Role, tasks, and authorities of the Data Security Officer;
- Auditing data and information security systems.
14 Hours
Testimonials (3)
Experience sharing, it's teacher's know-how and valuable.
Carey Fan - Logitech
Course - C/C++ Secure Coding
get to understand more about the product and some key differences between RHDS and open source OpenLDAP.
Jackie Xie - Westpac Banking Corporation
Course - 389 Directory Server for Administrators
the knowledge of the trainer was very high - he knew what he was talking about, and knew the answers to our questions