We may earn an affiliate commission when you visit our partners.
Pluralsight logo

Security Compliance, Governance, and Frameworks

Richard Harpur

Compliance requirements are confusing and difficult to understand. This course explains common security compliance requirements, simplifying them so you can be confident in your daily work or projects and when talking to your peers or clients.

Read more

Compliance requirements are confusing and difficult to understand. This course explains common security compliance requirements, simplifying them so you can be confident in your daily work or projects and when talking to your peers or clients.

There are now more Security Compliance requirements than ever before and with new requirements arriving each year it can be difficult to stay informed. In this course, Security Compliance, Governance, and Frameworks, you’ll receive a walk through of the major security compliance requirements. First, you'll discover the scope for each compliance program. Next, you’ll learn what your obligations are under each security compliance program. Finally, you'll explore the implications of non-compliance, which can be very significant in some cases. Best of all, this course simplifies the security requirements and doesn’t get caught up on technical language, allowing you to quickly get an overview of each security compliance program. When you’re finished with this course, you'll have developed a foundational knowledge of many security compliance programs and be confident talking to your peers or clients about these programs.

Enroll now

What's inside

Syllabus

Course Overview
The What, Who, and Why of Security Compliance
Complying with the PCI standard
Complying with the GDPR
Read more
Complying with ISO27000 Standards Family
Complying with HIPAA
Complying with SOX and GLBA
Understand NIST Standards
Understand the CIS Standard

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Develops foundational knowledge of major security compliance standards
Explores scope, obligations, and implications of security compliance
Provides a simplified overview of security compliance requirements without technical jargon

Save this course

Save Security Compliance, Governance, and Frameworks to your list so you can find it easily later:
Save

Activities

Coming soon We're preparing activities for Security Compliance, Governance, and Frameworks. These are activities you can do either before, during, or after a course.

Career center

Learners who complete Security Compliance, Governance, and Frameworks will develop knowledge and skills that may be useful to these careers:
Security Analyst
Security Analysts are professionals who monitor and analyze an organization's computer systems and networks in order to detect and prevent security breaches. To be successful in this role, you not only need to be an expert in security measures, but you also need to be an expert in compliance standards and requirements. This course will provide you with a foundational knowledge of many security compliance programs, such as the Payment Card Industry Data Security Standard (PCI DSS), the General Data Protection Regulation (GDPR), and the International Organization for Standardization (ISO) 27000 family of standards. By developing a solid understanding of these compliance programs, you will be better equipped to protect organizations from security breaches and data loss.
Compliance Auditor
Compliance Auditors are responsible for ensuring that organizations are in compliance with all applicable laws and regulations. In order to be successful in this role, you need to have a deep understanding of compliance requirements and how to assess an organization's compliance with those requirements. The Security Compliance, Governance, and Frameworks online course provides you with a comprehensive overview of the major security compliance requirements. You will gain hands-on experience in assessing an organization's compliance with these requirements, which will help you prepare for a career as a Compliance Auditor.
IT Auditor
IT Auditors are responsible for reviewing and evaluating an organization's IT systems and processes to ensure that they are in compliance with all applicable laws and regulations. It is imperative for IT Auditors to have a solid understanding of compliance requirements so that they can make sure that an organization's IT systems are meeting compliance standards to protect against risks that may result in financial or reputational damage. This course will help you develop a strong foundation in security compliance requirements and standards, which will be invaluable as you work to ensure that organizations are meeting their compliance obligations.
Compliance Manager
It is becoming increasingly important for some businesses to hire professionals who can guide and oversee compliance standards. As a Compliance Manager, you are responsible for maintaining compliance with all relevant laws and regulations. You must have thorough knowledge of compliance requirements and their related standards, which is why this Security Compliance, Governance, and Frameworks course may be a valuable asset to the foundational knowledge you will need for this role. You will learn about the major security compliance requirements, their scopes, and the implications of non-compliance, which can be very significant in some cases. This will help you gain the knowledge and confidence you will need to help businesses meet compliance standards.
Security Consultant
Security Consultants provide guidance and support to organizations on how to improve their security posture. The Security Compliance, Governance, and Frameworks course provides you with knowledge and skills that you can use to help organizations develop and implement effective security programs. You will gain experience in assessing an organization's security risks and vulnerabilities, and you will learn how to develop and implement security controls to mitigate those risks. This course will help you build a strong foundation for a successful career as a Security Consultant.
Information Security Manager
Information Security Managers are responsible for developing and implementing security policies and procedures to protect an organization's information assets. To be successful in this role, you need to have a deep understanding of compliance requirements and how to implement them within an organization. This course will help you build that foundational knowledge by providing you with a comprehensive overview of the major security compliance requirements. You will also gain hands-on experience in implementing these requirements within an organization.
Privacy Officer
Privacy Officers are responsible for developing and implementing privacy policies and procedures to protect an organization's customer data. As a Privacy Officer, you need to have a solid understanding of compliance requirements, as well as an understanding of how to implement those requirements within an organization. This course will help you build a strong foundation for a successful career as a Privacy Officer by providing you with a comprehensive overview of the major security compliance requirements. You will also gain hands-on experience in implementing these requirements within an organization.
Chief Compliance Officer (CCO)
Chief Compliance Officers (CCOs) are responsible for developing and implementing an organization's compliance program. CCOs need to have extensive knowledge of compliance requirements, as well as expertise in implementing and managing those requirements across an organization. This course will provide you with the foundation you need to develop and implement a robust and effective compliance program.
Risk Manager
Risk Managers are responsible for identifying, assessing, and mitigating risks to an organization. To be successful in this role, you need to have a deep understanding of compliance requirements and how to implement them within an organization. This course will help you build that foundational knowledge by providing you with a comprehensive overview of the major security compliance requirements. You will also gain hands-on experience in implementing these requirements within an organization.
Chief Information Security Officer (CISO)
Chief Information Security Officers (CISOs) are responsible for developing and implementing an organization's overall security strategy. CISO's need to have a broad knowledge of compliance requirements and how to implement them across an organization. This course will provide you with the knowledge and skills you need to identify and develop controls, policies, standards, and procedures that are in line with industry best practices and regulatory requirements.
Data Protection Officer (DPO)
Data Protection Officers (DPOs) are responsible for overseeing an organization's compliance with data protection regulations. As a DPO, you need to have strong knowledge of data protection requirements, as well as experience in implementing and managing those requirements across an organization. This course will teach you about the major data protection regulations, the roles and responsibilities of DPOs, and the steps involved in implementing a data protection compliance program.
Chief Privacy Officer (CPO)
Chief Privacy Officers (CPOs) are responsible for developing and implementing an organization's privacy program. As a CPO, you need to have a deep understanding of privacy requirements, as well as experience in implementing and managing those requirements across an organization. This course will provide you with the foundation you need to build your knowledge of the current privacy landscape and how to address the latest privacy challenges.
Security Architect
Security Architects are responsible for designing and implementing an organization's overall security strategy. Security Architects need to have a deep understanding of compliance requirements and how to implement them across an organization. This course will provide you with the knowledge and skills you need to identify and develop controls, policies, standards, and procedures that are in line with industry best practices and regulatory requirements.
Security Engineer
Security Engineers are responsible for designing, implementing, and maintaining an organization's security infrastructure. In today's increasingly complex regulatory environment, Security Engineers are also increasingly responsible for ensuring that their organization's security infrastructure meets all applicable compliance requirements. This course will help you develop a strong foundation in security compliance requirements and standards, which will enable you to design and implement security infrastructure that meets the needs of your organization and its customers.
IT Project Manager
IT Project Managers are responsible for planning and executing IT projects. To be successful in this role, you need to have a strong understanding of compliance requirements and how to implement them within an organization. This course will help you build that foundational knowledge by providing you with a comprehensive overview of the major security compliance requirements. You will also gain hands-on experience in implementing these requirements within an organization.

Reading list

We've selected eight books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Security Compliance, Governance, and Frameworks.
Provides a concise overview of ISO 27001, the international standard for information security management. It great resource for anyone who is new to ISO 27001 or who wants a quick refresher.
Great introduction to security compliance for beginners. It covers the basics of security compliance, including the different types of compliance requirements, the benefits of compliance, and the risks of non-compliance.
Provides a practical guide to compliance management for businesses, covering the various aspects of compliance, including risk management, audit, and reporting.
Provides a comprehensive guide to security risk assessment, including how to plan, conduct, and report on a security risk assessment.
Provides a practical guide to penetration testing, including how to plan, conduct, and report on a penetration test.
Provides a comprehensive guide to memory forensics, including how to collect, analyze, and interpret memory data.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Security Compliance, Governance, and Frameworks.
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser