CISA 2022: Data Privacy
CISA
| Expert
- 14 videos | 1h 22m 38s
- Includes Assessment
- Earns a Badge
Any IT environment requires a firm understanding of data privacy. Privacy laws and regulations, combined with industry practices, form the basis for effective information protection. In this course, you'll explore data privacy, beginning with the CIA Triad, personally identifiable information (PII), and Protected Health Information (PHI). You will learn about the General Data Protection Regulation (GDPR), Payment Card Industry Data Security Standard (PCI DSS), compliance with GDPR and PCI DSS, the Health Insurance Portability and Accountability Act (HIPAA), and Federal Risk and Authorization Management Program (FedRAMP). Finally, you'll dig into assets and risks, annualized loss expectancy (ALE), and network inventories. This course helps prepare learners for the ISACA certification exam, Certified Information Systems Auditor (CISA).
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseOutline the pillars of the cia triad and how it reinforces it securityRecognize examples of personally identifiable information (pii)Identify examples of protected health information (phi)Outline how the general data protection regulation (gdpr) regulates and enforces user data privacyAlign data protection policies with gdprOutline how the payment card industry data security standard (pci dss) protects cardholder information
-
Identify network devices with insufficient antimalware protection using the free spiceworks toolRecognize how the health insurance portability and accountability act (hipaa) protects sensitive medical informationDescribe how the federal risk and authorization management program (fedramp) standards are used to secure u.s. government information systemsRecognize the importance of identifying assets that have the most value to a specific organizationDetermine the annualized loss expectancy (ale) value using an online ale calculatorScan a network using nmap to determine which devices are presentSummarize the key concepts covered in this course
IN THIS COURSE
-
1m 18sIn this video, we will discover the key concepts covered in this course. FREE ACCESS
-
9m 24sAfter completing this video, you will be able to outline the pillars of the CIA Triad and how it reinforces IT security. FREE ACCESS
-
4m 53sUpon completion of this video, you will be able to recognize examples of personally identifiable information (PII). FREE ACCESS
-
4m 54sAfter completing this video, you will be able to identify examples of Protected Health Information (PHI). FREE ACCESS
-
5m 19sUpon completion of this video, you will be able to outline how the General Data Protection Regulation (GDPR) regulates and enforces user data privacy. FREE ACCESS
-
6m 4sFind out how to align data protection policies with GDPR. FREE ACCESS
-
5m 46sUpon completion of this video, you will be able to outline how the Payment Card Industry Data Security Standard (PCI DSS) protects cardholder information. FREE ACCESS
-
12m 4sIn this video, discover how to identify network devices with insufficient antimalware protection using the free Spiceworks tool. FREE ACCESS
-
4m 57sUpon completion of this video, you will be able to recognize how the Health Insurance Portability and Accountability Act (HIPAA) protects sensitive medical information. FREE ACCESS
-
5m 55sAfter completing this video, you will be able to describe how the Federal Risk and Authorization Management Program (FedRAMP) standards are used to secure U.S. government information systems. FREE ACCESS
-
6m 17sUpon completion of this video, you will be able to recognize the importance of identifying assets that have the most value to a specific organization. FREE ACCESS
-
6mIn this video, you will learn how to determine the annualized loss expectancy (ALE) value using an online ALE calculator. FREE ACCESS
-
8m 53sUpon completion of this video, you will be able to scan a network using Nmap to determine which devices are present. FREE ACCESS
-
54sIn this video, we will summarize the key concepts covered in this course. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.