Featured resource
pluralsight tech forecast
2025 Tech Forecast

Which technologies will dominate in 2025? And what skills do you need to keep up?

Check it out
Hamburger Icon
  • Course
    • Libraries: If you want this course, consider one of these libraries.
    • Security

Security Compliance, Governance, and Frameworks

Compliance requirements are confusing and difficult to understand. This course explains common security compliance requirements, simplifying them so you can be confident in your daily work or projects and when talking to your peers or clients.

Richard Harpur - Pluralsight course - Security Compliance, Governance, and Frameworks
by Richard Harpur

What you'll learn

There are now more Security Compliance requirements than ever before and with new requirements arriving each year it can be difficult to stay informed. In this course, Security Compliance, Governance, and Frameworks, you’ll receive a walk through of the major security compliance requirements. First, you'll discover the scope for each compliance program. Next, you’ll learn what your obligations are under each security compliance program. Finally, you'll explore the implications of non-compliance, which can be very significant in some cases. Best of all, this course simplifies the security requirements and doesn’t get caught up on technical language, allowing you to quickly get an overview of each security compliance program. When you’re finished with this course, you'll have developed a foundational knowledge of many security compliance programs and be confident talking to your peers or clients about these programs.

Table of contents

About the author

Richard Harpur - Pluralsight course - Security Compliance, Governance, and Frameworks
Richard Harpur

Richard has worked for over 20 years in various technology management roles working in card payments and regulated financial sectors. He spent several years deploying niche payment card solutions in Europe and more recently as CIO, serving the US mortgage sector. Richard specializes in IT Risk and Information Security management.

More Courses by Richard