Favorites
b/udemy1byELKinG

Build Security Incident Response For Gdpr Data Protection

Build Security Incident Response For Gdpr Data Protection

Last updated 5/2022
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 1.92 GB | Duration: 8h 33m

CIPT, CIPM_FREE GDPR and Incident Response Templates & Documentation - Practical GDPR and Incident Response Blueprint

What you'll learn
Understand what incident response is
Will have a list of templates to use
Will have a list of incident response tools and resources
Will have a list of incident response playbooks
Requirements
You should have basic IT Security knowledge
You should have basic audit and compliance knowledge
You should have basic risk management knowledge
Description
UPDATE: 8.5 hours of content - 2021!!! Take Cyber Security Incident Response approach in order to cover the Data Breach process required by GDPR Data Privacy Protection .--------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------“Lessons from ex IBM, MICROSOFT, about how to make privacy operational and how to get 3 privacy certifications in less than 30 days: CIPTv2020, CIPM, CIPP/E by IAPP”***************************************************************************************************************************************************MY FIRST PROMISE TO YOU is the following: You will be prepared to pass 3 IAPP certifications in less than 30 days if you follow the below learning plan:Course 1: Build EU GDPR data protection compliance from scratch (CIPT)Course 2: How to succeed in a Data Privacy Officer Role (GDPR DPO, CIPM)Course 3: GDPR Privacy Data Protection Case Studies Explained (CIPP/E, CIPM, CIPT)Course 4: Ultimate Privacy by Design Guide - step by step strategies with examples (CIPM, CIPT)Course 5: Build Security Incident Response for GDPR Data Protection (incl. parts from CIPT and CIPM also)Course 6: (part of CIPP/US): California Consumer Privacy Act (CCPA) - Complete course - we are here!!!***************************************************************************************************************************************************My name is Roland Costea and after spending my last 8 years working for Microsoft, IBM, Genpact and Cognizant as a Privacy & Security Director being able to create hundreds of integrated security & privacy programmes for top organizations in the world, I have decided to put all my experience together in a comprehensive privacy LEARNING PLAN, to show how to actually make Data Privacy operational and most importantly how to think out of the box.I have been involved in engineering privacy for a lot of industries including Automotive (Mercedes-Benz, Geely, Volvo) and also provided DPO as a service for several other top companies in Europe and US. I have worked and developed the privacy strategy for Microsoft & IBM for the whole Central & Eastern Europe and also drived Cognizant Security & Privacy business in DACH.Certifications I hold: CIPT, CIPM, CISSP, CDPSE, CRISC, CISM, CCSK, CCSP, LPT, CEH, ECSA, TOGAF***************************************************************************************************************************************************In this course you will learn what Cyber Security Incident Response is and how it relates to GDPR Data Privacy, and if you are used to my style, you will do it from 3 perspective: theory, processes and technology. You will be able to apply our security methodologies, security frameworks and security processes for your own environment.The course is a complete A to Z, so we will cover everything that you need to know. In this way, we will first understand Cyber Security Incident Response challenges, difference between a NOC and a SOC (Cyber Security Operation Center) and how the latest can help in defining the Cyber Security Incident Response Process. We will follow up with GDPR Data Protection & Privacy relation and the impact of GDPR to Cyber Security Incident Response for any organization. We will learn about methodologies, frameworks, playbooks, we will draft 2 procedures and we will see how technology can help us in the roadmap. And all of these are separate resources that you will get! In the end, I will give an incredible collection of cyber security incident response free tools and resources I have build during time and i will teach how malware works, especially in the financial market. The course is delivered in a mix of over the shoulder lessons and powerpoint presentations. So, either I show you clicks on the screen and how exactly you do different actions, or I present you the full concept using slides. On top of that, you will get downloadable resources that will help you in your journey. I strongly recommend that you go through every lecture one time and then go back to the beginning and start to take action – in this way everything will get much more sense. As a student of this course, you will also get regular updates and access to new additional lectures as they are added.

Overview

Section 1: Introduction

Lecture 1 Welcome & Intro

Lecture 2 Set your expectations

Lecture 3 A 1st touch of what you will really get in the course

Lecture 4 My first promise to you - get certified in less than 30 days: CIPT, CIPM, CIPP/E

Lecture 5 Presentations (ppt)

Section 2: Incident Response in CyberSecurity

Lecture 6 What is Incident Response and why do I need it?

Lecture 7 Incident Response Team

Lecture 8 Incident Response Process and Procedures

Lecture 9 Types of Security Incidents

Lecture 10 Incident Response Tools - general

Lecture 11 What is a SIEM?

Lecture 12 Incident Response Training

Lecture 13 What is automation in incident response

Section 3: Building a Security Operations Center (SOC)

Lecture 14 What is a NOC?

Lecture 15 What is a SOC?

Lecture 16 Integrated NOC and SOC

Lecture 17 Mission, Team and Required Training

Lecture 18 Types of SOC

Lecture 19 Building a SOC

Lecture 20 Cheat Sheets to help you in configuring your systems

Section 4: GDPR and Incident Response

Lecture 21 GDPR intro

Lecture 22 GDPR effects on Incident Response

Lecture 23 How to create an effective IR plan

Lecture 24 GDPR Incident Response Process

Lecture 25 Lets draft the IRM Procedure

Lecture 26 How to treat data breaches

Section 5: GDPR Incident Response Methodologies (IRM)

Lecture 27 IRM1 - Worm Infection

Lecture 28 IRM2 - Windows Intrusion

Lecture 29 IRM3 - Unix/Linux Intrusion Detection

Lecture 30 IRM4 - DDoS

Lecture 31 IRM5 - Malicious Network Behaviour

Lecture 32 IRM6 - Website Defacement

Lecture 33 IRM7 - Windows malware detection

Lecture 34 IRM8 - Blackmail

Lecture 35 IRM9 - SmartphoneMalware

Lecture 36 IRM10 - Social Engineering

Lecture 37 IRM11 - Information Leakage

Lecture 38 IRM12 - Insider Abuse

Lecture 39 IRM13 - Phishing

Lecture 40 IRM14 - Scam

Lecture 41 IRM15 - Ransomware

Section 6: Incident Response Tools for GDPR compliance - free vs enterprise

Lecture 42 Lessons learned by working in a SOC

Lecture 43 A list of open source tools to use

Lecture 44 Windows Defender ATP

Section 7: Banking challenges related to cyber risk

Lecture 45 Today Challenges

Lecture 46 Target and Distribution

Lecture 47 Attack Methods

Lecture 48 Infection vectors

Lecture 49 Targeted attacks against financial institutions

Lecture 50 Mobile platform and email scams

Lecture 51 Takedowns and Conclusions

Section 8: Financial Malware history with examples

Lecture 52 Past 3 decades of malware (part 1)

Lecture 53 Past 3 decades of malware (part 2)

Lecture 54 The architecture of financial malware

Lecture 55 Zeus

Lecture 56 Zeus GameOver

Lecture 57 SpyEye

Lecture 58 IceIX

Lecture 59 Citadel

Lecture 60 Carberp

Lecture 61 Shylock

Lecture 62 Bugat

Lecture 63 Dyre

Lecture 64 Dridex

Lecture 65 Shifu

Lecture 66 Tinba

Section 9: Making a business case for Financial Malware

Lecture 67 Why Fraud Risk Engines fail

Lecture 68 How to bypass 2 factor authentication (2FA)

Lecture 69 Fraud Prevention Technology

Lecture 70 Compliance and Legal Issues

Lecture 71 Customer impact

Lecture 72 Selecting the right cybercrime solution

Lecture 73 Malware detection

Lecture 74 Malware detection - advanced

Lecture 75 Malware detection - how technology can help

Lecture 76 Criminal Detection & Account Takeover

Lecture 77 What about mobile banking?

Section 10: Some simple hacking attempts - demo

Lecture 78 Lab setup

Lecture 79 XSRF attack

Lecture 80 Compromising Public server

Lecture 81 Break-In: Compromising the victim computer

Lecture 82 Other Web Application Attack Example

Lecture 83 Locky Ransomware

Lecture 84 Gathering Info & Exfiltrate

Section 11: Conclusion

Lecture 85 Final thoughts and other documents

Lecture 86 BONUS - Remember my first promise to you - get certified in less than 30 days?

Anyone interested in GDPR compliance,Any security enthusiast willing to learn about GDPR,Anyone interested in incident response,Anyone interested in how to start an incident response programme,Anyone interested in technologies that can help achieving GDPR compliance

Screenshots

Build Security Incident Response For Gdpr Data Protection

Homepage

without You and Your Support We Can’t Continue
Thanks for Buying Premium From My Links for Support
Click >>here & Visit My Blog Daily for More Udemy Tutorial. If You Need Update or Links Dead Don't Wait Just Pm Me or Leave Comment at This Post

No comments have been posted yet. Please feel free to comment first!

    Load more replies

    Join the conversation!

    Log in or Sign up
    to post a comment.