Regulatory Compliance: Compliance In The It Landscape

Posted By: ELK1nG

Regulatory Compliance: Compliance In The It Landscape
Published 6/2025
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 1.39 GB | Duration: 5h 10m

Master the Key IT Compliance Frameworks and Regulations to Protect Your Organization and Avoid Costly Penalties

What you'll learn

Understand the critical role IT plays in achieving and maintaining regulatory compliance across various industries.

Identify the core requirements of major compliance frameworks such as GDPR, HIPAA, PCI DSS, SOX, CCPA, and more.

Implement practical strategies and technical controls to meet specific regulatory standards.

Evaluate the risks, penalties, and business impacts of non-compliance in real-world IT environments.

Align cybersecurity practices with compliance mandates using frameworks like NIST CSF, ISO/IEC 27001, and ISO 22301.

Access and utilize supplementary resources to support ongoing compliance efforts and audits.

Requirements

No prior experience required

Description

Regulatory compliance is no longer just a legal responsibility—it's a critical function of IT. This comprehensive course is designed for IT professionals, system administrators, cybersecurity personnel, and compliance officers who need to understand and implement key regulatory requirements across industries and geographies.This course breaks down the core responsibilities of IT in ensuring organizational compliance with major regulations and standards, including GDPR, HIPAA, FISMA, SOX, PCI DSS, CMMC, CCPA, ISO/IEC 27001, NIST CSF, and many others. You'll gain a practical understanding of what each law or framework entails, how to ensure and implement compliance, what the penalties are for failing to meet them, and where to find additional resources to stay informed and up-to-date.By the end of this course, you'll be able to:Understand the role of IT in maintaining regulatory compliance and securing sensitive data.Identify and interpret key compliance frameworks and regulations across sectors.Apply implementation strategies and controls to meet regulatory standards.Recognize the consequences and penalties of non-compliance to help your organization avoid costly mistakes.Reference supplemental resources and documentation for deeper knowledge and practical use.What You’ll Learn:The foundations of IT's role in compliance management.In-depth reviews of 15+ major compliance frameworks including GDPR, HIPAA, PCI DSS, CCPA, SOX, FISMA, and more.Practical implementation strategies for each regulation.Common pitfalls and enforcement actions to avoid.How compliance standards align with broader cybersecurity initiatives like NIST CSF and ISO standards.The importance of business continuity, cloud controls, and data privacy in maintaining a compliant IT environment.Whether you're stepping into a compliance-related role or looking to strengthen your organization’s regulatory posture, this course gives you the clarity and tools you need to contribute to a secure, audit-ready infrastructure.Who Should Take This Course:IT professionals tasked with regulatory complianceSecurity analysts and engineersCompliance officers and auditorsSystem administrators and IT managersStudents and professionals entering cybersecurity or governance rolesGet ready to elevate your understanding of IT compliance and play a key role in protecting your organization from regulatory risk.

Overview

Section 1: IT Compliance Introduction

Lecture 1 Introduction to the IT Role in Compliance

Lecture 2 Overview of Regulations

Section 2: General Data Protection Regulation (GDPR)

Lecture 3 Overview of GDPR

Lecture 4 Ensuring and Implementing GDPR Compliance

Lecture 5 Penalties and Repercussions for GDPR Non-Compliance

Lecture 6 GDPR Extra References

Section 3: Health Insurance Portability and Accountability Act (HIPAA)

Lecture 7 Overview of HIPAA

Lecture 8 Ensuring and Implementing HIPAA Compliance

Lecture 9 Penalties and Repercussions for HIPAA Non-Compliance

Lecture 10 HIPAA Extra Resources

Section 4: Federal Information Security Management Act (FISMA)

Lecture 11 Overview of FISMA

Lecture 12 Ensuring and Implementing FISMA Compliance

Lecture 13 Ensuring and Implementing FISMA Compliance

Lecture 14 FISMA Extra Resources

Section 5: Sarbanes-Oxley Act (SOX)

Lecture 15 Introduction to SOX

Lecture 16 Ensuring and Implementing SOX Compliance

Lecture 17 Penalties and Repercussions for SOX Non-Compliance

Lecture 18 SOX Extra References

Section 6: Payment Card Industry Data Security Standard (PCI DSS)

Lecture 19 Overview of PCI DSS

Lecture 20 Ensuring and Implementing PCI DSS Compliance

Lecture 21 Penalties and Repercussions for PCI DSS Non-Compliance

Lecture 22 PCI DSS Extra References

Section 7: Cybersecurity Maturity Model Certification (CMMC)

Lecture 23 Introduction to CMMC and Its Purpose

Lecture 24 Ensuring and Implementing CMMC Compliance

Lecture 25 Repercussions for CMMC Non-Compliance

Lecture 26 CMMC Extra References

Section 8: California Consumer Privacy Act (CCPA)

Lecture 27 Overview of CCPA

Lecture 28 Ensuring and Implementing CCPA Compliance

Lecture 29 Penalties and Repercussions for CCPA Non-Compliance

Lecture 30 CCPA Extra References

Section 9: ISO/IEC 27001 Compliance

Lecture 31 Overview of ISO/IEC 27001

Lecture 32 Ensuring and Implementing ISO/IEC 27001 Compliance

Lecture 33 Repercussions for ISO/IEC 27001 Non-Compliance

Lecture 34 ISO/IEC 27001 Extra References

Section 10: Children's Online Privacy Protection Act (COPPA)

Lecture 35 Children's Online Privacy Protection Act (COPPA)

Lecture 36 Ensuring and Implementing COPPA Compliance

Lecture 37 Penalties and Repercussions for COPPA Non-Compliance

Lecture 38 COPPA Extra References

Section 11: NIST Cybersecurity Framework (CSF)

Lecture 39 Overview of NIST CSF

Lecture 40 Ensuring and Implementing NIST CSF Compliance

Lecture 41 Repercussions for NIST CSF Non-Compliance

Lecture 42 NIST CSF Extra References

Section 12: Gramm-Leach-Bliley Act (GLBA)

Lecture 43 Overview of GLBA

Lecture 44 Ensuring and Implementing GLBA Compliance

Lecture 45 Penalties and Repercussions for GLBA Non-Compliance

Lecture 46 GLBA Extra References

Section 13: ISO 22301 Business Continuity Management

Lecture 47 Overview of ISO 22301

Lecture 48 Ensuring and Implementing ISO 22301 Compliance

Lecture 49 Repercussions for ISO 22301 Non-Compliance

Lecture 50 BCM Extra References

Section 14: Cloud Security Alliance (CSA) Cloud Controls Matrix (CCM)

Lecture 51 Overview of CSA CCM

Lecture 52 Ensuring and Implementing CSA CCM Compliance

Lecture 53 Repercussions for CSA CCM Non-Compliance

Lecture 54 CSA Extra References

Section 15: Family Educational Rights and Privacy Act (FERPA)

Lecture 55 Overview of FERPA

Lecture 56 Ensuring and Implementing FERPA Compliance

Lecture 57 Penalties and Repercussions for FERPA Non-Compliance

Lecture 58 FERPA Extra References

Section 16: Digital Millennium Copyright Act (DMCA)

Lecture 59 Overview of DMCA

Lecture 60 Ensuring and Implementing DMCA Compliance

Lecture 61 Penalties and Repercussions for DMCA Non-Compliance

Lecture 62 DMCA Extra References

Lecture 63 IT Compliance Course Closeout

IT professionals, System administrators, Cybersecurity analysts, Compliance officers, IT auditors, Risk management professionals, Students entering the field of IT governance or security, Technical managers responsible for regulatory oversight, Cloud and data privacy consultants, Professionals preparing for compliance-related certifications