Protection Mechanisms for Data at Rest

Course: IFIS/CS/1004 Mode: IND| ORG | GEN. Availability: PUB Data at rest has proved to a more lucrative venture for cybercriminals owing to the fact that more volumes of valuable information are easily accessible at rest than when in transit. And in the midst of the COVID-19 pandemic prompting employees to work from geographically dispersed areas, data at rest has increasing become a usual spot for malicious actors since motivated attackers even need not have credentials to access unencrypted hard drives. Whereas conventional antivirus software and application firewalls are common security measures employed to foster data protection, social engineering remains a potentially open door to the enemy, resulting in compromised credentials, ransomware deployment and privileged access. With case studies to reflect on data theft scenarios, the course shades more light on how to apply robust protection techniques and best practices at network end-points. Key learning outcomes:
  1. Recognize risks associated with unencrypted data in a state of rest.
  2. Reflect and draw actionable insights from case studies on data theft.
  3. Know how to deploy adequate security measures and protection tools for data on storage media.
  4. Effectively back up and retrieve data to foster cyber-resilient business processes.
This training is available virtually live (via instructor-led virtual session) and online self-study in two options– IND | GEN. Study times – EVE | BTC | WEK | FLX KEY: IND – You can self-enroll and study at your own pace. Fees -UGX.146,000 Per pax GEN – Register and attend a virtual live event every time enrolled students are 5 people or more. Live sessions commence every time the 5th person enrolls. – The fee per pax is UGX. 150,000 EVE – Evening Classes 6 pm to 9 pm on Tuesdays, Wednesdays and Thursdays BTC – Bootcamp Classes – From Monday to Friday, 9:00 am to 5:00 pm. WEK – Live Studies during normal weekdays, Monday to Friday, any time from 9:00 am to 5:00 pm FLX – Flexible Studies at your convenience as long a you are a group of 5 students enrolled on the course or more. Tell us your preferred study options for practical live classes. Duration: 2hours live, and 3 hours self-study practical work.

Responses

Subscribe to Newletter

Subscribe to our newsletter and stay updated with the latest in cybersecurity and digital forensics.