Objectives of the training
The objective is to understand the fundamentals of Big Data and its impact on security, identify the risks associated with data, master regulatory frameworks such as the Bill 25 and ISO 27001, and learn how to implement security, governance, and access control policies tailored to Big Data environments.Targeted audience
IT recruiters, security or compliance managers, data analysts/data engineers, IT project managers, HR managers involved in data managementPrerequisite
• Basic knowledge of information systems or cybersecurity. • Awareness of personal data protection issues. • Experience in an IT or HR environment.Trainers
Benefits for Participants
• Identify the risks associated with data collection, storage, and processing.
• Master regulatory and normative frameworks (Law 25, ISO 27001).
• Implement security policies adapted to Big Data environments.
• Apply methods of governance and control of data access.
Course architecture
Chapter 1: Introduction to Big Data
• Definition and characteristics (Volume, Velocity, Variety, etc.)
• Use cases in businesses
Chapter 2: Big Data Architecture
• Hadoop, Spark, NoSQL
• Distributed storage and parallel processing
Chapter 3: Security issues in Big Data environments
• Specific vulnerabilities
• Complexity of access management
Workshop 1: Mapping data flows in a Big Data architecture
Data security and compliance
Chapter 4: Regulatory frameworks
• ISO 27001: security requirements
• Comparative overview with other North American frameworks (e.g., PIPEDA at the Canadian federal level)
Chapter 5: Data governance
• Roles and responsibilities
• Data classification policy
• Data lifecycle management
Workshop 2: Assessing compliance with Law 25 using a fictional case study (internal audit simulation, identification of discrepancies, corrective action plan)
Implementation and best practices
Chapter 6: Securing Big Data environments
• Data encryption
• Authentication and access control
• API and interface security
Chapter 7: Monitoring and auditing
• Monitoring tools
• Anomaly detection
• Data security audit
Workshop 3: Implementing a security plan for a Big Data platform (including Act 25 requirements: impact assessment, technical and organizational measures, subcontractor management)
Pedagogical details
Type of training
Private or personalized training
If you have more than 8 people to sign up for a particular course, it can be delivered as a private session right at your offices. Contact us for more details.
Request a quotePrivate or personalized training
If you have more than 8 people to sign up for a particular course, it can be delivered as a private session right at your offices. Contact us for more details.
Request a quote