We may earn an affiliate commission when you visit our partners.
Course image
Udacity logo

Data Security

Christine Izuakor, PhD, CISSP

Take the first steps towards understanding, classifying, and protecting data with Udacity's online Data Security Training Course. Learn the fundamentals today!

Prerequisite details

Read more

Take the first steps towards understanding, classifying, and protecting data with Udacity's online Data Security Training Course. Learn the fundamentals today!

Prerequisite details

To optimize your success in this program, we've created a list of prerequisites and recommendations to help you prepare for the curriculum. Prior to enrolling, you should have the following knowledge:

  • Cybersecurity fluency

You will also need to be able to communicate fluently and professionally in written and spoken English.

What's inside

Syllabus

This lesson provides an overview of the course including a brief introduction to data security, a brief history, when data security applies, and who it affects. Get a look at the final project.
Read more
Data governance is about understanding the data in your organization, its importance, who owns it, and where it exists. This enables you to effectively manage and secure it.
In order to protect data from unauthorized access, you will need to know how to map out a storage architecture and then apply the appropriate encryption for both data at rest and in transit.
In order to ensure data is trustworthy within the organization, you will need to understand information rights management, access control, file integrity, and auditing.
Through planned incident response, disaster recovery, business continuity, and backup strategy, organizations can ensure data is available when needed.
You’ll spend a day in the life of a data security professional going through the process of establishing and implementing data security controls.

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Develops knowledge of data security, which is vital for compliance and legal reasons in all industries and job roles
Covers contemporary practices, such as information rights management, access control, file integrity, and auditing, which are recommended by the cybersecurity industry
Examines data security's relevance to cybersecurity, which is essential for all industries and roles
Teaches incident response planning, disaster recovery, and backup strategy, which are key skills for IT professionals
Requires knowledge of cybersecurity, which may be a potential barrier to entry for beginners
Taught by Christine Izuakor, PhD, CISSP, who is a recognized cybersecurity professional

Save this course

Save Data Security to your list so you can find it easily later:
Save

Activities

Coming soon We're preparing activities for Data Security. These are activities you can do either before, during, or after a course.

Career center

Learners who complete Data Security will develop knowledge and skills that may be useful to these careers:
Data Security Analyst
As a Data Security Analyst, you will play a critical role in protecting and securing your organization's most valuable asset: its data. In this role, you will participate in activities such as assessing risks, developing and implementing security measures, and responding to incidents. Being that this role often requires an advanced degree, courses like Udacity's Data Security Training Course can be stepping stones toward building a strong foundation in data security and preparing for a successful career as a Data Security Analyst.
Security Engineer
As a Security Engineer, you will help design, implement and maintain security systems for the organization. You will also investigate and respond to security incidents. Udacity's Data Security Training Course can help you build a comprehensive understanding of data security concepts and practices. This course will introduce you to the fundamentals of data security, including data classification, encryption, access control, and disaster recovery.
Compliance Manager
Compliance Managers play a vital role in ensuring that their organization complies with all applicable laws and regulations. This role may also oversee the development and implementation of security policies and procedures. Udacity's Data Security Training Course can help you understand the legal and regulatory frameworks that govern data security and to prepare for a career as a leader in this field.
Information Security Analyst
Information Security Analysts identify, assess, and mitigate security risks within an organization. They also develop and implement security policies and procedures. Udacity's Data Security Training Course can help you understand the principles and practices of information security, including data security, network security, and cybersecurity.
Security Architect
Security Architects design and implement security solutions for organizations. They also oversee the development and implementation of security policies and procedures. Udacity's Data Security Training Course can help you understand the principles and practices of security architecture, including data security, network security, and cybersecurity.
Cybersecurity Analyst
Cybersecurity Analysts identify, assess, and mitigate security risks in computer systems and networks. They also develop and implement security policies and procedures. Udacity's Data Security Training Course can help you understand the principles and practices of cybersecurity, including data security, network security, and cryptography.
Forensic Analyst
Forensic Analysts examine digital evidence to help solve crimes. They also provide expert testimony in court. Udacity's Data Security Training Course can help you understand the principles and practices of digital forensics, including data recovery, analysis, and reporting.
Privacy Analyst
Privacy Analysts work to protect the privacy of individuals' data. They develop and implement privacy policies and procedures and train employees on privacy practices. Udacity's Data Security Training Course can help you understand the principles and practices of privacy law and compliance, including data protection, data privacy, and data security.
Risk Analyst
Risk Analysts identify, assess, and mitigate risks. They also develop and implement risk management plans. Udacity's Data Security Training Course can help you understand the principles and practices of risk management, including data security risk assessment, risk mitigation, and risk reporting.
Information Systems Manager
Information Systems Managers plan, implement, and maintain information systems. They also oversee the development and implementation of security policies and procedures. Udacity's Data Security Training Course can help you understand the principles and practices of information systems management, including data security, network security, and systems administration.
IT Security Manager
IT Security Managers plan, implement, and maintain security systems for organizations. They also oversee the development and implementation of security policies and procedures. Udacity's Data Security Training Course can help you understand the principles and practices of IT security management, including data security, network security, and cybersecurity.
Network Security Engineer
Network Security Engineers design, implement, and maintain security systems for computer networks. They also oversee the development and implementation of security policies and procedures. Udacity's Data Security Training Course can help you understand the principles and practices of network security, including data security, network security, and cybersecurity.
Software Engineer
Software Engineers design, develop, and maintain software applications. They also oversee the development and implementation of security policies and procedures. Udacity's Data Security Training Course can help you understand the principles and practices of software engineering, including data security, software security, and software development.
IT Auditor
IT Auditors examine an organization's IT systems and processes to ensure that they are secure and compliant with applicable laws and regulations. Udacity's Data Security Training Course can help you understand the principles and practices of IT auditing, including data security, network security, and IT compliance.
Technical Writer
Technical Writers create and maintain technical documentation, such as user manuals, technical reports, and white papers. Udacity's Data Security Training Course can help you understand the principles and practices of technical writing, including data security, technical writing, and documentation.

Reading list

We've selected ten books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Data Security.
Provides a comprehensive overview of data security and privacy, covering topics such as data encryption, access control, and incident response. It valuable resource for anyone who wants to learn more about data security.
Provides a comprehensive overview of cryptography and network security, covering topics such as encryption, authentication, and network security protocols. It valuable resource for anyone who wants to learn more about cryptography and network security.
Provides a comprehensive overview of the Security+ certification exam, covering topics such as risk assessment, security controls, and incident response. It valuable resource for anyone who is preparing for the Security+ exam.
Provides a practical guide to penetration testing, covering topics such as reconnaissance, vulnerability assessment, and exploitation. It valuable resource for anyone who wants to learn more about penetration testing.
Provides a comprehensive overview of hacking techniques, covering topics such as buffer overflows, SQL injection, and cross-site scripting. It valuable resource for anyone who wants to learn more about hacking.
Classic account of how a young computer scientist tracked down a hacker who was breaking into computer systems around the world. It fascinating read for anyone who is interested in the history of hacking.
Science fiction novel that explores the dangers of a virtual reality world where hackers can take over people's minds. It thought-provoking read for anyone who is interested in the future of technology.
Popular science book that explores the history of cryptography. It fascinating read for anyone who is interested in the history of code breaking.
Memoir by Kevin Mitnick, one of the most famous hackers in the world. It fascinating read for anyone who is interested in the life of a hacker.
Practical guide to hacking techniques, covering topics such as social engineering, password cracking, and vulnerability scanning. It valuable resource for anyone who wants to learn more about hacking.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Data Security.
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser