Tags
Language
Tags
June 2025
Su Mo Tu We Th Fr Sa
1 2 3 4 5 6 7
8 9 10 11 12 13 14
15 16 17 18 19 20 21
22 23 24 25 26 27 28
29 30 1 2 3 4 5
    Attention❗ To save your time, in order to download anything on this site, you must be registered 👉 HERE. If you do not have a registration yet, it is better to do it right away. ✌

    ( • )( • ) ( ͡⚆ ͜ʖ ͡⚆ ) (‿ˠ‿)
    SpicyMags.xyz

    Build Security Incident Response For Gdpr Data Protection

    Posted By: ELK1nG
    Build Security Incident Response For Gdpr Data Protection

    Build Security Incident Response For Gdpr Data Protection
    Last updated 5/2022
    MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
    Language: English | Size: 1.92 GB | Duration: 8h 33m

    CIPT, CIPM_FREE GDPR and Incident Response Templates & Documentation - Practical GDPR and Incident Response Blueprint

    What you'll learn
    Understand what incident response is
    Will have a list of templates to use
    Will have a list of incident response tools and resources
    Will have a list of incident response playbooks
    Requirements
    You should have basic IT Security knowledge
    You should have basic audit and compliance knowledge
    You should have basic risk management knowledge
    Description
    UPDATE: 8.5 hours of content - 2021!!! Take Cyber Security Incident Response approach in order to cover the Data Breach process required by GDPR Data Privacy Protection .––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––––“Lessons from ex IBM,  MICROSOFT,  about how to make privacy operational and how to get 3 privacy certifications in less than 30 days: CIPTv2020, CIPM, CIPP/E by IAPP”***************************************************************************************************************************************************MY FIRST PROMISE TO YOU is the following: You will be prepared to pass 3 IAPP certifications in less than 30 days if you follow the below learning plan:Course 1: Build EU GDPR data protection compliance from scratch (CIPT)Course 2: How to succeed in a Data Privacy Officer Role (GDPR DPO, CIPM)Course 3: GDPR Privacy Data Protection Case Studies Explained (CIPP/E, CIPM, CIPT)Course 4: Ultimate Privacy by Design Guide - step by step strategies with examples (CIPM, CIPT)Course 5: Build Security Incident Response for GDPR Data Protection (incl. parts from CIPT and CIPM also)Course 6: (part of CIPP/US): California Consumer Privacy Act (CCPA) - Complete course - we are here!!!***************************************************************************************************************************************************My name is Roland Costea and after spending my last 8 years working for Microsoft, IBM, Genpact and Cognizant as a Privacy & Security Director being able to create hundreds of integrated security & privacy programmes for top organizations in the world, I have decided to put all my experience together in a comprehensive privacy LEARNING PLAN, to show how to actually make Data Privacy operational and most importantly how to think out of the box.I have been involved in engineering privacy for a lot of industries including Automotive (Mercedes-Benz, Geely, Volvo) and also provided DPO as a service for several other top companies in Europe and US. I have worked and developed the privacy strategy for Microsoft & IBM for the whole Central & Eastern Europe and also drived Cognizant Security & Privacy business in DACH.Certifications I hold: CIPT, CIPM, CISSP, CDPSE, CRISC, CISM, CCSK, CCSP, LPT, CEH, ECSA, TOGAF***************************************************************************************************************************************************In this course you will learn what Cyber Security Incident Response is and how it relates to GDPR Data Privacy, and if you are used to my style, you will do it from 3 perspective: theory, processes and technology.   You will be able to apply our security methodologies, security frameworks and security processes for your own environment.The course is a complete A to Z, so we will cover everything that you need to know. In this way, we will first understand Cyber Security Incident Response challenges, difference between a NOC and a SOC (Cyber Security Operation Center) and how the latest can help in defining the Cyber Security Incident Response Process.  We will follow up with GDPR Data Protection & Privacy relation and the impact of GDPR to Cyber Security Incident Response for any organization. We will learn about methodologies, frameworks, playbooks, we will draft 2 procedures and we will see how technology can help us in the roadmap.   And all of these are separate resources that you will get!   In the end, I will give an incredible collection of cyber security incident response free tools and resources I have build during time and i will teach how malware works, especially in the financial market.    The course is delivered in a mix of over the shoulder lessons and powerpoint presentations. So, either I show you clicks on the screen and how exactly you do different actions, or I present you the full concept using slides. On top of that, you will get downloadable resources that will help you in your journey.   I strongly recommend that you go through every lecture one time and then go back to the beginning and start to take action – in this way everything will get much more sense.    As a student of this course, you will also get regular updates and access to new additional lectures as they are added.

    Overview

    Section 1: Introduction

    Lecture 1 Welcome & Intro

    Lecture 2 Set your expectations

    Lecture 3 A 1st touch of what you will really get in the course

    Lecture 4 My first promise to you - get certified in less than 30 days: CIPT, CIPM, CIPP/E

    Lecture 5 Presentations (ppt)

    Section 2: Incident Response in CyberSecurity

    Lecture 6 What is Incident Response and why do I need it?

    Lecture 7 Incident Response Team

    Lecture 8 Incident Response Process and Procedures

    Lecture 9 Types of Security Incidents

    Lecture 10 Incident Response Tools - general

    Lecture 11 What is a SIEM?

    Lecture 12 Incident Response Training

    Lecture 13 What is automation in incident response

    Section 3: Building a Security Operations Center (SOC)

    Lecture 14 What is a NOC?

    Lecture 15 What is a SOC?

    Lecture 16 Integrated NOC and SOC

    Lecture 17 Mission, Team and Required Training

    Lecture 18 Types of SOC

    Lecture 19 Building a SOC

    Lecture 20 Cheat Sheets to help you in configuring your systems

    Section 4: GDPR and Incident Response

    Lecture 21 GDPR intro

    Lecture 22 GDPR effects on Incident Response

    Lecture 23 How to create an effective IR plan

    Lecture 24 GDPR Incident Response Process

    Lecture 25 Lets draft the IRM Procedure

    Lecture 26 How to treat data breaches

    Section 5: GDPR Incident Response Methodologies (IRM)

    Lecture 27 IRM1 - Worm Infection

    Lecture 28 IRM2 - Windows Intrusion

    Lecture 29 IRM3 - Unix/Linux Intrusion Detection

    Lecture 30 IRM4 - DDoS

    Lecture 31 IRM5 - Malicious Network Behaviour

    Lecture 32 IRM6 - Website Defacement

    Lecture 33 IRM7 - Windows malware detection

    Lecture 34 IRM8 - Blackmail

    Lecture 35 IRM9 - SmartphoneMalware

    Lecture 36 IRM10 - Social Engineering

    Lecture 37 IRM11 - Information Leakage

    Lecture 38 IRM12 - Insider Abuse

    Lecture 39 IRM13 - Phishing

    Lecture 40 IRM14 - Scam

    Lecture 41 IRM15 - Ransomware

    Section 6: Incident Response Tools for GDPR compliance - free vs enterprise

    Lecture 42 Lessons learned by working in a SOC

    Lecture 43 A list of open source tools to use

    Lecture 44 Windows Defender ATP

    Section 7: Banking challenges related to cyber risk

    Lecture 45 Today Challenges

    Lecture 46 Target and Distribution

    Lecture 47 Attack Methods

    Lecture 48 Infection vectors

    Lecture 49 Targeted attacks against financial institutions

    Lecture 50 Mobile platform and email scams

    Lecture 51 Takedowns and Conclusions

    Section 8: Financial Malware history with examples

    Lecture 52 Past 3 decades of malware (part 1)

    Lecture 53 Past 3 decades of malware (part 2)

    Lecture 54 The architecture of financial malware

    Lecture 55 Zeus

    Lecture 56 Zeus GameOver

    Lecture 57 SpyEye

    Lecture 58 IceIX

    Lecture 59 Citadel

    Lecture 60 Carberp

    Lecture 61 Shylock

    Lecture 62 Bugat

    Lecture 63 Dyre

    Lecture 64 Dridex

    Lecture 65 Shifu

    Lecture 66 Tinba

    Section 9: Making a business case for Financial Malware

    Lecture 67 Why Fraud Risk Engines fail

    Lecture 68 How to bypass 2 factor authentication (2FA)

    Lecture 69 Fraud Prevention Technology

    Lecture 70 Compliance and Legal Issues

    Lecture 71 Customer impact

    Lecture 72 Selecting the right cybercrime solution

    Lecture 73 Malware detection

    Lecture 74 Malware detection - advanced

    Lecture 75 Malware detection - how technology can help

    Lecture 76 Criminal Detection & Account Takeover

    Lecture 77 What about mobile banking?

    Section 10: Some simple hacking attempts - demo

    Lecture 78 Lab setup

    Lecture 79 XSRF attack

    Lecture 80 Compromising Public server

    Lecture 81 Break-In: Compromising the victim computer

    Lecture 82 Other Web Application Attack Example

    Lecture 83 Locky Ransomware

    Lecture 84 Gathering Info & Exfiltrate

    Section 11: Conclusion

    Lecture 85 Final thoughts and other documents

    Lecture 86 BONUS - Remember my first promise to you - get certified in less than 30 days?

    Anyone interested in GDPR compliance,Any security enthusiast willing to learn about GDPR,Anyone interested in incident response,Anyone interested in how to start an incident response programme,Anyone interested in technologies that can help achieving GDPR compliance