Category:

Data Protection & Secure Collaboration

Level:

Beginner

No. of hours:

1

Learning Objectives (By the end of this Learning Unit you will be able to...)

  • Classify data by sensitivity level and who can access it
  • Explain various types of Access controls
  • Implement mechanisms of Access Controls

Topics Covered:

  • Classification of data by sensitivity level
  • Types of Acces controls
  • Mechanisms of Implementing Access Controls

Category:

Data Protection & Secure Collaboration

Level:

Intermediate

No. of hours:

2

Learning Objectives (By the end of this Learning Unit you will be able to...)

  • Store and process data in secure ways
  • Use methods to encrypt files

Topics Covered:

  • Techniques for encrypting data
  • Examples of Secure File Storage Solutions
  • Best Practices for Secure File Storage

Category:

Data Protection & Secure Collaboration

Level:

Beginner 

No. of hours:

3

Learning Objectives (By the end of this Learning Unit you will be able to...)

  • Use procedures for backing up data
  • List emergency data wipe options
  • Apply procedures for recovering data

Topics Covered:

  • Offline vs. cloud backups
  • Cloud/external Backups, system restore (windows file history, Mac time machine), Bacula
  • Data recovery software (Recuva, disk drill)
  • Remote wipe, built-in OS security options self-destruction apps, hard drive secure erase

Category:

Data Protection & Secure Collaboration

Level:

Intermediate

No. of hours:

2

Learning Objectives (By the end of this Learning Unit you will be able to...)

  • Explain  the basics of Advanced Authentication & Identity Management

Topics Covered:

  • Implementing Single Sign-On (SSO) & Multi-Factor Authentication (MFA)
  • Privileged Access Management (PAM)
  • Defending against credential stuffing & brute-force attacks

Category:

Organisational Data Encryption & Secure Storage

Level:

Intermediate

No. of hours:

2

Learning Objectives (By the end of this Learning Unit you will be able to...)

  • Explain differences between full-disk and file-level encryption
  • Identify documents requiring file-level encryption
  • Develop procedures for data retention

Topics Covered:

  • Full-disk encryption vs. file-level encryption
  • Best practices for data retention & disposal

Category:

Data Protection & Secure Collaboration

Level:

Intermediate

No. of hours:

2

Learning Objectives (By the end of this Learning Unit you will be able to...)

  • Explain cloud security models
  • Identify misconfigurations & cloud-based attacks

Topics Covered:

  • Cloud security models
  • Configuring security controls in Google Cloud
  • Preventing misconfigurations & cloud-based attacks

Category:

Secure communications and source protection

Level:

Advanced

No. of hours:

2

Learning Objectives (By the end of this Learning Unit you will be able to...)

  • How to use Secure Drop to protect the source
  • Understand the details of installing Secure Drop

Topics Covered:

  • Secure Drop features (for media outlets and whistleblowers)
  • Installation of Secure Drop
  • Use (for media outlets and whistleblowers)