Cyber Security Threat Management With DP
Introduction
to Information Security and Privacy, CIA Triad, Cyber Security vs
Information Security, Risk Management, Cyber Threats which are real,
Threat Modelling.
| Responsible | Administrator |
|---|---|
| Last Update | 09/03/2026 |
| Members | 1 |
Short Term
Industry 4.0 Technology
No lessons are available yet.
Content
- Security Awareness & Training
- Protection of Information Assets
- Data Security Controls
- Secure Data Handling
- Enterprise Security Architecture
- Threat & Vulnerability Management
- Cyber Attack Life Cycle
- Overview of Security Assessment-approach & methodology Data Security & Privacy - by Design & Default
- Software Development Life Cycle / SecDevOps
- EU GDPR
- Data Protection Act
- Rights of the Data Subject
- Role of a Data Officer
- Six Data Protection Principles Data Controller and Processor
- Data Protection Impact Assessment (DPIA)
- Common Data Breaches/Security Incidents
- Data Protection and Privacy Compliance Framework
- Building the Cyber Defence
- Cyber Security Strategy
- Case Studies/Exercise/ Fun Quiz Games