Regulatory Compliance: Compliance In The It Landscape
Published 6/2025
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 1.39 GB | Duration: 5h 10m
Published 6/2025
MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz
Language: English | Size: 1.39 GB | Duration: 5h 10m
Master the Key IT Compliance Frameworks and Regulations to Protect Your Organization and Avoid Costly Penalties
What you'll learn
Understand the critical role IT plays in achieving and maintaining regulatory compliance across various industries.
Identify the core requirements of major compliance frameworks such as GDPR, HIPAA, PCI DSS, SOX, CCPA, and more.
Implement practical strategies and technical controls to meet specific regulatory standards.
Evaluate the risks, penalties, and business impacts of non-compliance in real-world IT environments.
Align cybersecurity practices with compliance mandates using frameworks like NIST CSF, ISO/IEC 27001, and ISO 22301.
Access and utilize supplementary resources to support ongoing compliance efforts and audits.
Requirements
No prior experience required
Description
Regulatory compliance is no longer just a legal responsibility—it's a critical function of IT. This comprehensive course is designed for IT professionals, system administrators, cybersecurity personnel, and compliance officers who need to understand and implement key regulatory requirements across industries and geographies.This course breaks down the core responsibilities of IT in ensuring organizational compliance with major regulations and standards, including GDPR, HIPAA, FISMA, SOX, PCI DSS, CMMC, CCPA, ISO/IEC 27001, NIST CSF, and many others. You'll gain a practical understanding of what each law or framework entails, how to ensure and implement compliance, what the penalties are for failing to meet them, and where to find additional resources to stay informed and up-to-date.By the end of this course, you'll be able to:Understand the role of IT in maintaining regulatory compliance and securing sensitive data.Identify and interpret key compliance frameworks and regulations across sectors.Apply implementation strategies and controls to meet regulatory standards.Recognize the consequences and penalties of non-compliance to help your organization avoid costly mistakes.Reference supplemental resources and documentation for deeper knowledge and practical use.What You’ll Learn:The foundations of IT's role in compliance management.In-depth reviews of 15+ major compliance frameworks including GDPR, HIPAA, PCI DSS, CCPA, SOX, FISMA, and more.Practical implementation strategies for each regulation.Common pitfalls and enforcement actions to avoid.How compliance standards align with broader cybersecurity initiatives like NIST CSF and ISO standards.The importance of business continuity, cloud controls, and data privacy in maintaining a compliant IT environment.Whether you're stepping into a compliance-related role or looking to strengthen your organization’s regulatory posture, this course gives you the clarity and tools you need to contribute to a secure, audit-ready infrastructure.Who Should Take This Course:IT professionals tasked with regulatory complianceSecurity analysts and engineersCompliance officers and auditorsSystem administrators and IT managersStudents and professionals entering cybersecurity or governance rolesGet ready to elevate your understanding of IT compliance and play a key role in protecting your organization from regulatory risk.
Overview
Section 1: IT Compliance Introduction
Lecture 1 Introduction to the IT Role in Compliance
Lecture 2 Overview of Regulations
Section 2: General Data Protection Regulation (GDPR)
Lecture 3 Overview of GDPR
Lecture 4 Ensuring and Implementing GDPR Compliance
Lecture 5 Penalties and Repercussions for GDPR Non-Compliance
Lecture 6 GDPR Extra References
Section 3: Health Insurance Portability and Accountability Act (HIPAA)
Lecture 7 Overview of HIPAA
Lecture 8 Ensuring and Implementing HIPAA Compliance
Lecture 9 Penalties and Repercussions for HIPAA Non-Compliance
Lecture 10 HIPAA Extra Resources
Section 4: Federal Information Security Management Act (FISMA)
Lecture 11 Overview of FISMA
Lecture 12 Ensuring and Implementing FISMA Compliance
Lecture 13 Ensuring and Implementing FISMA Compliance
Lecture 14 FISMA Extra Resources
Section 5: Sarbanes-Oxley Act (SOX)
Lecture 15 Introduction to SOX
Lecture 16 Ensuring and Implementing SOX Compliance
Lecture 17 Penalties and Repercussions for SOX Non-Compliance
Lecture 18 SOX Extra References
Section 6: Payment Card Industry Data Security Standard (PCI DSS)
Lecture 19 Overview of PCI DSS
Lecture 20 Ensuring and Implementing PCI DSS Compliance
Lecture 21 Penalties and Repercussions for PCI DSS Non-Compliance
Lecture 22 PCI DSS Extra References
Section 7: Cybersecurity Maturity Model Certification (CMMC)
Lecture 23 Introduction to CMMC and Its Purpose
Lecture 24 Ensuring and Implementing CMMC Compliance
Lecture 25 Repercussions for CMMC Non-Compliance
Lecture 26 CMMC Extra References
Section 8: California Consumer Privacy Act (CCPA)
Lecture 27 Overview of CCPA
Lecture 28 Ensuring and Implementing CCPA Compliance
Lecture 29 Penalties and Repercussions for CCPA Non-Compliance
Lecture 30 CCPA Extra References
Section 9: ISO/IEC 27001 Compliance
Lecture 31 Overview of ISO/IEC 27001
Lecture 32 Ensuring and Implementing ISO/IEC 27001 Compliance
Lecture 33 Repercussions for ISO/IEC 27001 Non-Compliance
Lecture 34 ISO/IEC 27001 Extra References
Section 10: Children's Online Privacy Protection Act (COPPA)
Lecture 35 Children's Online Privacy Protection Act (COPPA)
Lecture 36 Ensuring and Implementing COPPA Compliance
Lecture 37 Penalties and Repercussions for COPPA Non-Compliance
Lecture 38 COPPA Extra References
Section 11: NIST Cybersecurity Framework (CSF)
Lecture 39 Overview of NIST CSF
Lecture 40 Ensuring and Implementing NIST CSF Compliance
Lecture 41 Repercussions for NIST CSF Non-Compliance
Lecture 42 NIST CSF Extra References
Section 12: Gramm-Leach-Bliley Act (GLBA)
Lecture 43 Overview of GLBA
Lecture 44 Ensuring and Implementing GLBA Compliance
Lecture 45 Penalties and Repercussions for GLBA Non-Compliance
Lecture 46 GLBA Extra References
Section 13: ISO 22301 Business Continuity Management
Lecture 47 Overview of ISO 22301
Lecture 48 Ensuring and Implementing ISO 22301 Compliance
Lecture 49 Repercussions for ISO 22301 Non-Compliance
Lecture 50 BCM Extra References
Section 14: Cloud Security Alliance (CSA) Cloud Controls Matrix (CCM)
Lecture 51 Overview of CSA CCM
Lecture 52 Ensuring and Implementing CSA CCM Compliance
Lecture 53 Repercussions for CSA CCM Non-Compliance
Lecture 54 CSA Extra References
Section 15: Family Educational Rights and Privacy Act (FERPA)
Lecture 55 Overview of FERPA
Lecture 56 Ensuring and Implementing FERPA Compliance
Lecture 57 Penalties and Repercussions for FERPA Non-Compliance
Lecture 58 FERPA Extra References
Section 16: Digital Millennium Copyright Act (DMCA)
Lecture 59 Overview of DMCA
Lecture 60 Ensuring and Implementing DMCA Compliance
Lecture 61 Penalties and Repercussions for DMCA Non-Compliance
Lecture 62 DMCA Extra References
Lecture 63 IT Compliance Course Closeout
IT professionals, System administrators, Cybersecurity analysts, Compliance officers, IT auditors, Risk management professionals, Students entering the field of IT governance or security, Technical managers responsible for regulatory oversight, Cloud and data privacy consultants, Professionals preparing for compliance-related certifications