About the training
Students will learn about risk management processes with a focus on how to manage the risk related to the use, processing, storage, and transmission of data.
Students will learn about risk management processes with a focus on how to manage the risk related to the use, processing, storage, and transmission of data.
What you will learn
Assess, manage and control the risk related associated to the use, processing, storage and transmission of data. Identify key risk metrics with the aim of being able to mitigate against a particular risk scenario. Appraise the laws, regulations, policies and ethics as they relate to cyber security and privacy. Evaluate key data security standards designed to protect personal information. Assess and test an organizations procedures in the event of data compromise, and operational and financial impact of the violation/compromise.
Assess, manage and control the risk related associated to the use, processing, storage and transmission of data. Identify key risk metrics with the aim of being able to mitigate against a particular risk scenario. Appraise the laws, regulations, policies and ethics as they relate to cyber security and privacy. Evaluate key data security standards designed to protect personal information. Assess and test an organizations procedures in the event of data compromise, and operational and financial impact of the violation/compromise.
Training information
Fully Online, University course, instructor led , assess fully through course work.
Fully Online, University course, instructor led , assess fully through course work.