Call To Action - Sidebar (Style 2)
In the digital world, information security is not just a technical matter but a business priority. This is why OTEAcademy offers top-tier, internationally recognized training and certification programs in Data Security.
Whether you are just starting out or already have years of experience in cybersecurity, there is a program tailored to your needs.
Contact the OTEAcademy team to learn more about the available Data Security Trainings!
Available Trainings
CC – Certified in Cybersecurity
-
Security fundamentals (Confidentiality, Integrity, Availability)
-
Business continuity (BC, DR, IR)
-
Access controls (Physical & Logical Access Controls)
-
Network security fundamentals
-
Security operations
CCSP - Certified Cloud Security Professional
-
Security of Data, Applications & Infrastructure in the Cloud
-
Cloud Solutions Design
-
Knowledge Certification
-
Cloud application security
-
Legal, risk & compliance
CISSP – Certified Information Systems Security Professional
-
Strategic-Level Cybersecurity Certification
-
In-depth Coverage of the 8 Core Domains of Information Security
-
International Recognition
-
Security & Risk Management
Microsoft Certified: Security, Compliance, and Identity Fundamentals (SC-900)
-
Security, Compliance & Identity in the Microsoft Cloud
-
Designed for Entry-Level IT Professionals and Business Staff
-
In-Person Training by Certified OTEAcademy Instructors
Definition (Greek) | Definition (English) | Definition/Comment |
Κυβερνοασφάλεια | Cybersecurity | The protection of information systems, network infrastructure, and data assets from cyber threats and malicious activities. |
Ασφάλεια δεδομένων | Data security | Protection of data against unauthorized access or modification. |
CC | Certified in Cybersecurity (CC) | ISC² certification for beginners in cybersecurity. |
CISSP | Certified Information Systems Security Professional (CISSP) | ISC² certification for cybersecurity professionals. |
CCSP | Certified Cloud Security Professional (CCSP) | ISC² certification in cloud security. |
Εμπιστευτικότητα | Confidentiality | Ensuring the confidentiality of information by restricting access to authorized individuals only. |
Ακεραιότητα | Integrity | Ensuring the integrity of data by maintaining its accuracy and protecting it from unauthorized modification or corruption. |
Διαθεσιμότητα | Availability | Ensuring the availability of information and resources to authorized users whenever required. |
Συνέχιση επιχειρησιακής λειτουργίας | Business Continuity (BC) | Business continuity plans and procedures to ensure operational resilience during crises. |
Ανάκαμψη από καταστροφή | Disaster Recovery (DR) | Disaster recovery procedures for resuming operations following a significant disruption. |
Ανταπόκριση σε περιστατικά | Incident Response (IR) | Security incident management and response. |
Έλεγχοι πρόσβασης | Access Controls | Access control mechanisms that regulate who can access resources and how. |
Φυσικοί έλεγχοι πρόσβασης | Physical Access Controls | Physical access control mechanisms. |
Λογικοί έλεγχοι πρόσβασης | Logical Access Controls | Digital access control mechanisms. |
Θεμελιώδεις αρχές ασφάλειας δικτύου | Network Security Fundamentals | Fundamental concepts of network security. |
Λειτουργίες ασφάλειας | Security Operations | Day-to-day administration of security systems and procedures. |
Ασφάλεια cloud | Cloud security | Cloud security for data, applications, and infrastructure. |
Αρχιτεκτονική cloud | Cloud architecture | Engineering and designing secure cloud infrastructure architectures. |
Ασφάλεια δεδομένων στο cloud | Cloud data security | Securing data residing in cloud environments. |
Ασφάλεια πλατφόρμας & υποδομής cloud | Cloud platform & infrastructure security | Security controls and safeguards for cloud platforms and infrastructures. |
Ασφάλεια εφαρμογών στο cloud | Cloud application security | Application security for cloud-hosted services. |
Λειτουργίες ασφάλειας στο cloud | Cloud security operations | Security processes and protocols for cloud environments. |
Νομικά θέματα | Legal | Legal issues related to security. |
Διαχείριση κινδύνων | Risk management | Procedures for Risk Assessment and Risk Management. |
Συμμόρφωση | Compliance | Compliance with Safety Standards and Regulations. |
Διαχείριση ταυτότητας και πρόσβασης | Identity & Access Management (IAM) | Management of User Identities and Access Rights. |
Αρχές ασφάλειας λογισμικού | Software security principles | Best Practices for Secure Software Development. |
Αξιολόγηση και δοκιμή ασφάλειας | Security Assessment & Testing | Security Assessment Controls and Testing. |
Ασφάλεια στην ανάπτυξη λογισμικού | Software Development Security | Integration of Security into the Development Process. |