SMALS STANDARDS

RGPD, les implications sur un projet et les délivrables sont expliqués.

SMALS STANDARDS

Une initiation à la sécurité de l'information @ Smals.
Vous êtes initié aux concepts de base de la sécurité, en particulier la CIA (Confidentiality, Integrity, Availability) et la gestion des données de confidentialité. Les différents rôles, responsabilités, acteurs et protection des données sont expliqués. Vous serez présenté aux équipes de la sécurité de l'information, d'Entreprisk Risk Mgt et de la sécurité des applications.

SMALS STANDARDS

Les concepts de base de la classification des données, CIA (Confidentiality, Integrity, Availability) sont expliqués en détail. Le test d'intrusion, mieux connu sous le nom de Pen Test & Vulnerabilities sont discutés. Les champs Security dans les documents de projet sont également abordés.

FREE GDPR and Incident Response Templates & Documentation - Practical GDPR and Incident Response Blueprint. In this course, you will learn to:

● Understand what incident response is
● Will have a list of incident response tools and resources
● Will have a list of templates to use
● Will have a list of incident response playbooks

Demande de formation
Diving into cryptography with The Alpha Geek and Total Seminars team. Learn cyber security and ethical hacking. In this course, you will learn to:

● Define cryptography and the key role it plays in protecting our digital data
● Find out how Web sites use certificates to make sure our usernames, passwords, credit card numbers, and other personal data stay secure
● Understand ciphers, binary, hashing, symmetric and asymmetric cryptosystems, digital signatures and certificates, and public key infrastructure
● Learn how hashing helps us to be certain the data we receive or download is legitimate
● Prepare for the CompTIA Security+ exam by better understanding cryptography and PKI, one of the six exam domains


Demande de formation

This course follows a proven methodology for conducting thorough and effective technical security audits and assessments based on guidelines from NIST. Learn how to develop the testing methodology essential for technical security reviews. Discover how to identify and analyze targets, use key technical testing tools, identify and mitigate findings, and more. Performing technical information security audits and assessments is essential to protecting information assets. By the end of this course, you'll know how to determine if your network is secure.

Topics include
  • Cite the three phases of external security assessments.
  • Explain the reasons for conducting a log review.
  • Explain what network sniffing is and why it’s used.
  • Describe when to use a file integrity checking tool.
  • Differentiate between active network discovery and passive network discovery.
  • Explain how to scan for vulnerabilities.
  • Relate the three techniques useful for validating target vulnerabilities.
  • Explain the four-stage methodology of conducting penetration tests.

Ce cours n´est disponible qu´en anglais. Si ce n´est pas un problème pour vous, soumettez votre demande.

Deze infosessie  gaat over het thema ‘privacy & security aspecten van informatie systemen’. Tijdens deze sessies hebben we het specifiek over de ‘data protection impact analysis’ (DPIA), de gegevens-beschermings-effect-beoordeling.

Though technology changes rapidly, the need to assure the confidentiality, integrity, authenticity, and accountability of information does not. Understanding the basics of cryptography is fundamental to keeping your networks, systems, and data secure. In this course, Lisa Bock reviews the historical and present-day uses of encryption, including techniques such as symmetric and asymmetric encryption, algorithms, and hashing. She also reviews message digest and passwords and discusses practical ways to apply cryptography to ensure data security and integrity. By the end of this course, you'll have a solid understanding of what it takes to move and store data securely.

Ce cours n´est disponible qu´en anglais. Si ce n´est pas un problème pour vous, soumettez votre demande.

Cybersecurity can be daunting because of its technical complexity and the ever-changing threats to individuals and organizations. And more than ever, cybersecurity also is a core business function for organizations of all kinds. Just like other business issues—like finance, legal, or human resources—cybersecurity has its own set of external policies, laws, rules, established practices, and resources for getting help. Getting to know these policies and resources better across your organization—and not just within your IT department—can be hugely beneficial to your company. This course seeks to make key cybersecurity policies and resources clear and understandable—whether you work in IT, in business, or are just interested in how information security fits in with our public policies and laws. Join instructor Gregory Michaelidis to improve your personal or organizational cybersecurity with grounding in the latest regulations, governmental authorities, and resources available.

Ce cours n´est disponible qu´en anglais. Si ce n´est pas un problème pour vous, soumettez votre demande.