Build Security Incident Response for GDPR data protection | Udemy


Build Security Incident Response for GDPR data protection | Udemy
English | Size: 2.96 GB
Genre: eLearning

What you’ll learn
Understand what incident response is
Will have a list of templates to use
Will have a list of incident response tools and resources
Will have a list of incident response playbooks

UPDATE: 8.5 hours of content – 2020!!!

Take Security Incident Response approach in order to cover the Data Breach process required by GDPR Data Privacy Protection .

——————————————————————————————————————————————————————————————–“Lessons from ex IBM-er, MICROSOFT-er about how to make privacy operational and how to get 3 privacy certifications in less than 30 days: CIPTv2020, CIPM, CIPP/E by IAPP”

***************************************************************************************************************************************************

MY FIRST PROMISE TO YOU is the following: You will be prepared to pass 3 IAPP certifications in less than 30 days if you follow the below learning plan:

Course 1: Build EU GDPR data protection compliance from scratch (CIPT)

Course 2: How to succeed in a Data Privacy Officer Role (GDPR DPO, CIPM)

Course 3: GDPR Privacy Data Protection Case Studies Explained (CIPP/E, CIPM, CIPT)

Course 4: Ultimate Privacy by Design Guide – step by step strategies with examples (CIPM, CIPT)

Course 5: Build Security Incident Response for GDPR Data Protection (incl. parts from CIPT and CIPM also)

Course 6: (part of CIPP/US): California Consumer Privacy Act (CCPA) – Complete course – we are here!!!

***************************************************************************************************************************************************

My name is Roland Costea and after spending my last 8 years working for Microsoft, IBM, Genpact and Cognizant as a Privacy & Security Director being able to create hundreds of integrated security & privacy programmes for top organizations in the world, I have decided to put all my experience together in a comprehensive privacy LEARNING PLAN, to show how to actually make Data Privacy operational and most importantly how to think out of the box.

I have been involved in engineering privacy for a lot of industries including Automotive (Mercedes-Benz, Geely, Volvo) and also provided DPO as a service for several other top companies in Europe and US. I have worked and developed the privacy strategy for Microsoft & IBM for the whole Central & Eastern Europe and also drived Cognizant Security & Privacy business in DACH.

Certifications I hold: CIPT, CIPM, CISSP, CDPSE, CRISC, CISM, CCSK, CCSP, LPT, CEH, ECSA, TOGAF

***************************************************************************************************************************************************

In this course you will learn what Security Incident Response is and how it relates to GDPR Data Privacy, and if you are used to my style, you will do it from 3 perspective: theory, processes and technology.

You will be able to apply our security methodologies, security frameworks and security processes for your own environment.

The course is a complete A to Z, so we will cover everything that you need to know. In this way, we will first understand Security Incident Response challenges, difference between a NOC and a SOC (Security Operation Center) and how the latest can help in defining the Security Incident Response Process. We will follow up with GDPR Data Protection & Privacy relation and the impact of GDPR to Security Incident Response for any organization. We will learn about methodologies, frameworks, playbooks, we will draft 2 procedures and we will see how technology can help us in the roadmap.

And all of these are separate resources that you will get!

In the end, I will give an incredible collection of incident response free tools and resources I have build during time and i will teach how malware works, especially in the financial market.

The course is delivered in a mix of over the shoulder lessons and powerpoint presentations. So, either I show you clicks on the screen and how exactly you do different actions, or I present you the full concept using slides. On top of that, you will get downloadable resources that will help you in your journey.

I strongly recommend that you go through every lecture one time and then go back to the beginning and start to take action – in this way everything will get much more sense.

As a student of this course, you will also get regular updates and access to new additional lectures as they are added.

Who this course is for:
Anyone interested in GDPR compliance
Any security enthusiast willing to learn about GDPR
Anyone interested in incident response
Anyone interested in how to start an incident response programme
Anyone interested in technologies that can help achieving GDPR compliance

nitroflare.com/view/E25A56BEB16B452/UD592.16.8.part1.rar
nitroflare.com/view/0276F1C3EBB51FF/UD592.16.8.part2.rar
nitroflare.com/view/4E26FA632AF06D3/UD592.16.8.part3.rar
nitroflare.com/view/E16354A0298EA07/UD592.16.8.part4.rar
nitroflare.com/view/188751A8F00A28F/UD592.16.8.part5.rar
nitroflare.com/view/7F05D6AB8BD242A/UD592.16.8.part6.rar
nitroflare.com/view/D812FD7FA313959/UD592.16.8.part7.rar
nitroflare.com/view/F3818ECE178C131/UD592.16.8.part8.rar

rapidgator.net/file/3a3230da2f77bf31c2115d3024e71812/UD592.16.8.part1.rar.html
rapidgator.net/file/2c9579744bc31e88f64b5c8c2aa96b21/UD592.16.8.part2.rar.html
rapidgator.net/file/e94ec1fbd1f1b1396bb67bc23e31da7c/UD592.16.8.part3.rar.html
rapidgator.net/file/59a7b03505150e3358b5a8fcec1204d3/UD592.16.8.part4.rar.html
rapidgator.net/file/4ac65bcb935ac9feda7d55c5436d8f1b/UD592.16.8.part5.rar.html
rapidgator.net/file/b6108ceb5f74ca7ed8c17634ef4f20a0/UD592.16.8.part6.rar.html
rapidgator.net/file/79761179620b4e87b53e11ebfe45622a/UD592.16.8.part7.rar.html
rapidgator.net/file/fb3cd161760c46f127b5099a61889598/UD592.16.8.part8.rar.html

If any links die or problem unrar, send request to
forms.gle/e557HbjJ5vatekDV9

Leave a Comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.