Call To Action - Sidebar (Style 2)
In the digital world, information security is not just a technical matter but a business priority. This is why OTEAcademy offers top-tier, internationally recognized training and certification programs in Data Security.
Whether you are just starting out or already have years of experience in cybersecurity, there is a program tailored to your needs.
Contact the OTEAcademy team to learn more about the available Data Security Trainings!
Available Trainings
CC – Certified in Cybersecurity
-
Security fundamentals (Confidentiality, Integrity, Availability)
-
Business continuity (BC, DR, IR)
-
Access controls (Physical & Logical Access Controls)
-
Network security fundamentals
-
Security operations
CCSP - Certified Cloud Security Professional
-
Security of Data, Applications & Infrastructure in the Cloud
-
Cloud Solutions Design
-
Knowledge Certification
-
Cloud application security
-
Legal, risk & compliance
CISSP – Certified Information Systems Security Professional
-
Strategic-Level Cybersecurity Certification
-
In-depth Coverage of the 8 Core Domains of Information Security
-
International Recognition
-
Security & Risk Management
Microsoft Certified: Security, Compliance, and Identity Fundamentals (SC-900)
-
Security, Compliance & Identity in the Microsoft Cloud
-
Designed for Entry-Level IT Professionals and Business Staff
-
In-Person Training by Certified OTEAcademy Instructors
| Definition (Greek) | Definition (English) | Definition/Comment |
| Κυβερνοασφάλεια | Cybersecurity | The protection of information systems, network infrastructure, and data assets from cyber threats and malicious activities. |
| Ασφάλεια δεδομένων | Data security | Protection of data against unauthorized access or modification. |
| CC | Certified in Cybersecurity (CC) | ISC² certification for beginners in cybersecurity. |
| CISSP | Certified Information Systems Security Professional (CISSP) | ISC² certification for cybersecurity professionals. |
| CCSP | Certified Cloud Security Professional (CCSP) | ISC² certification in cloud security. |
| Εμπιστευτικότητα | Confidentiality | Ensuring the confidentiality of information by restricting access to authorized individuals only. |
| Ακεραιότητα | Integrity | Ensuring the integrity of data by maintaining its accuracy and protecting it from unauthorized modification or corruption. |
| Διαθεσιμότητα | Availability | Ensuring the availability of information and resources to authorized users whenever required. |
| Συνέχιση επιχειρησιακής λειτουργίας | Business Continuity (BC) | Business continuity plans and procedures to ensure operational resilience during crises. |
| Ανάκαμψη από καταστροφή | Disaster Recovery (DR) | Disaster recovery procedures for resuming operations following a significant disruption. |
| Ανταπόκριση σε περιστατικά | Incident Response (IR) | Security incident management and response. |
| Έλεγχοι πρόσβασης | Access Controls | Access control mechanisms that regulate who can access resources and how. |
| Φυσικοί έλεγχοι πρόσβασης | Physical Access Controls | Physical access control mechanisms. |
| Λογικοί έλεγχοι πρόσβασης | Logical Access Controls | Digital access control mechanisms. |
| Θεμελιώδεις αρχές ασφάλειας δικτύου | Network Security Fundamentals | Fundamental concepts of network security. |
| Λειτουργίες ασφάλειας | Security Operations | Day-to-day administration of security systems and procedures. |
| Ασφάλεια cloud | Cloud security | Cloud security for data, applications, and infrastructure. |
| Αρχιτεκτονική cloud | Cloud architecture | Engineering and designing secure cloud infrastructure architectures. |
| Ασφάλεια δεδομένων στο cloud | Cloud data security | Securing data residing in cloud environments. |
| Ασφάλεια πλατφόρμας & υποδομής cloud | Cloud platform & infrastructure security | Security controls and safeguards for cloud platforms and infrastructures. |
| Ασφάλεια εφαρμογών στο cloud | Cloud application security | Application security for cloud-hosted services. |
| Λειτουργίες ασφάλειας στο cloud | Cloud security operations | Security processes and protocols for cloud environments. |
| Νομικά θέματα | Legal | Legal issues related to security. |
| Διαχείριση κινδύνων | Risk management | Procedures for Risk Assessment and Risk Management. |
| Συμμόρφωση | Compliance | Compliance with Safety Standards and Regulations. |
| Διαχείριση ταυτότητας και πρόσβασης | Identity & Access Management (IAM) | Management of User Identities and Access Rights. |
| Αρχές ασφάλειας λογισμικού | Software security principles | Best Practices for Secure Software Development. |
| Αξιολόγηση και δοκιμή ασφάλειας | Security Assessment & Testing | Security Assessment Controls and Testing. |
| Ασφάλεια στην ανάπτυξη λογισμικού | Software Development Security | Integration of Security into the Development Process. |