The eleven courses in this suite provide you with the critical information that need to know, and the guidelines you must follow, to be compliant with common security data security regulations.
Produced by the SANS Institute
*Only available as a suite. Durations are approximate.
Organizations have a tremendous amount of sensitive information that must be safeguarded.This course explains how to protect information from risk including using authorized systems to store and process sensitive data and securely dispose of sensitive material. (Note: this module is required for most of the compliance videos.)
The help desk is often a targeted group within an organization. These people are trained to assist a variety of strangers over the phone. As such, additional steps must be taken to educate and protect these individuals.
If your organization stores, transmits, or processes card holder data, it is required to follow PCI DSS. This course can be used to comply with updated PCI DSS version 3.2 standards. PREREQUISITE: Data Security course.
This course explains what Protected Healthcare Information (PHI) is and covers the steps required to store, process, and use it. PREREQUISITE: Data Security course.
This course explains what PII is and the steps employees must take to protect it and other types of confidential information. PREREQUISITE: Data Security course.
Any organization working with federal tax information is regulated by federal law and required to take specific steps to protect that data. This course explains what federal tax information is, and details the steps that must be taken to protect that data and keep your organization compliant.
The Foreign Corrupt Practices Act applies to any organization that does business in the U.S. or has stocks, bonds, or other securities traded in U.S. markets. This course explains what FCPA is, why it’s important and the rules and processes that employees must follow to be compliant.
The European Unions Standards for Data Protection have been updated. This course explains the expanded requirements for data collection, handling, protection and disposal.
This course explains what GLBA is, what nonpublic personal information is, and the steps that employees must take to protect it and remain in compliance. The focus of the course includes both educational and financial examples. PREREQUISITE: Data Security course.
The Red Flags Rule is a federal regulation that requires organizations to implement an identity theft prevention program to detect the warning signs of identity theft. This module explains what thosered flags areand the actions to be taken when a flag has been identified.
Privacy laws work to protect personal information. They impact how information can be collected, accessed, disclosed, and maintained. In this updated course, the importance of privacy and the steps people should take to protect it are discussed.