
Category:
Data Protection & Secure Collaboration
Level:
Beginner
No. of hours:
1
Learning Objectives (By the end of this Learning Unit you will be able to...)
- Classify data by sensitivity level and who can access it
- Explain various types of Access controls
- Implement mechanisms of Access Controls
Topics Covered:
- Classification of data by sensitivity level
- Types of Acces controls
- Mechanisms of Implementing Access Controls

Category:
Data Protection & Secure Collaboration
Level:
Intermediate
No. of hours:
2
Learning Objectives (By the end of this Learning Unit you will be able to...)
- Store and process data in secure ways
- Use methods to encrypt files
Topics Covered:
- Techniques for encrypting data
- Examples of Secure File Storage Solutions
- Best Practices for Secure File Storage

Category:
Data Protection & Secure Collaboration
Level:
Beginner
No. of hours:
3
Learning Objectives (By the end of this Learning Unit you will be able to...)
- Use procedures for backing up data
- List emergency data wipe options
- Apply procedures for recovering data
Topics Covered:
- Offline vs. cloud backups
- Cloud/external Backups, system restore (windows file history, Mac time machine), Bacula
- Data recovery software (Recuva, disk drill)
- Remote wipe, built-in OS security options self-destruction apps, hard drive secure erase

Category:
Data Protection & Secure Collaboration
Level:
Intermediate
No. of hours:
2
Learning Objectives (By the end of this Learning Unit you will be able to...)
- Explain the basics of Advanced Authentication & Identity Management
Topics Covered:
- Implementing Single Sign-On (SSO) & Multi-Factor Authentication (MFA)
- Privileged Access Management (PAM)
- Defending against credential stuffing & brute-force attacks
Category:
Organisational Data Encryption & Secure Storage
Level:
Intermediate
No. of hours:
2
Learning Objectives (By the end of this Learning Unit you will be able to...)
- Explain differences between full-disk and file-level encryption
- Identify documents requiring file-level encryption
- Develop procedures for data retention
Topics Covered:
- Full-disk encryption vs. file-level encryption
- Best practices for data retention & disposal

Category:
Data Protection & Secure Collaboration
Level:
Intermediate
No. of hours:
2
Learning Objectives (By the end of this Learning Unit you will be able to...)
- Explain cloud security models
- Identify misconfigurations & cloud-based attacks
Topics Covered:
- Cloud security models
- Configuring security controls in Google Cloud
- Preventing misconfigurations & cloud-based attacks

Category:
Secure communications and source protection
Level:
Advanced
No. of hours:
2
Learning Objectives (By the end of this Learning Unit you will be able to...)
- How to use Secure Drop to protect the source
- Understand the details of installing Secure Drop
Topics Covered:
- Secure Drop features (for media outlets and whistleblowers)
- Installation of Secure Drop
- Use (for media outlets and whistleblowers)