{"id":3447,"date":"2025-10-14T11:57:13","date_gmt":"2025-10-14T09:57:13","guid":{"rendered":"https:\/\/cloudsandtraining.net\/site\/?page_id=3447"},"modified":"2026-05-06T12:47:49","modified_gmt":"2026-05-06T10:47:49","slug":"p41-cybersecurity-e-gestione-dei-dati","status":"publish","type":"page","link":"https:\/\/cloudsandtraining.net\/site\/catalogo-corsi-fad\/area-sicurezza-informatica-privacy\/p41-cybersecurity-e-gestione-dei-dati\/","title":{"rendered":"P41 \u2013 Cybersecurity e gestione dei dati"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"3447\" class=\"elementor elementor-3447\" data-elementor-post-type=\"page\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-5a2982e elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"5a2982e\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-80bb755\" data-id=\"80bb755\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c2471b4 elementor-widget elementor-widget-text-editor\" data-id=\"c2471b4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>Obiettivi del corso<\/strong><\/p><article class=\"text-token-text-primary w-full focus:outline-none scroll-mt-[calc(var(--header-height)+min(200px,max(70px,20svh)))]\" dir=\"auto\" tabindex=\"-1\" data-turn-id=\"request-WEB:7f505728-0e5b-4c3d-b072-26a0dc7cf8b4-3\" data-testid=\"conversation-turn-8\" data-scroll-anchor=\"true\" data-turn=\"assistant\"><div class=\"text-base my-auto mx-auto pb-10 [--thread-content-margin:--spacing(4)] thread-sm:[--thread-content-margin:--spacing(6)] thread-lg:[--thread-content-margin:--spacing(16)] px-(--thread-content-margin)\"><div class=\"[--thread-content-max-width:40rem] thread-sm:[--thread-content-max-width:40rem] thread-lg:[--thread-content-max-width:48rem] mx-auto max-w-(--thread-content-max-width) flex-1 group\/turn-messages focus-visible:outline-hidden relative flex w-full min-w-0 flex-col agent-turn\" tabindex=\"-1\"><div class=\"flex max-w-full flex-col grow\"><div class=\"min-h-8 text-message relative flex w-full flex-col items-end gap-2 text-start break-words whitespace-normal [.text-message+&amp;]:mt-5\" dir=\"auto\" data-message-author-role=\"assistant\" data-message-id=\"26d023fd-3725-44fc-b71e-a08e066f5774\" data-message-model-slug=\"gpt-5\"><div class=\"flex w-full flex-col gap-1 empty:hidden first:pt-[3px]\"><div class=\"markdown prose dark:prose-invert w-full break-words light markdown-new-styling\"><p data-start=\"209\" data-end=\"775\" data-is-last-node=\"\" data-is-only-node=\"\">Imparerai a riconoscere le principali minacce informatiche, proteggere sistemi e dati, gestire autenticazione e audit, e applicare le norme GDPR per la sicurezza delle informazioni.<\/p><p data-start=\"209\" data-end=\"775\" data-is-last-node=\"\" data-is-only-node=\"\"><strong>Argomenti principali<\/strong><\/p><ul><li>Introduzione al corso ed elementi di base<\/li><li>Gli attacchi e le forme di protezione (modulo in 2 parti)<\/li><li>Autenticazione e protezione<\/li><li>Auditing e Logging<\/li><li>Appendice GDPR: I dati personali e la gestione del rischio<\/li><li>Appendice GDPR: Le misure di sicurezza e il furto dei dati<\/li><\/ul><p>Durata totale: 2 ore<\/p><\/div><\/div><\/div><\/div><\/div><\/div><\/article>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Obiettivi del corso Imparerai a riconoscere le principali minacce informatiche, proteggere sistemi e dati, gestire autenticazione e audit, e applicare le norme GDPR per la sicurezza delle informazioni. Argomenti principali Introduzione al corso ed elementi di base Gli attacchi e le forme di protezione (modulo in 2 parti) Autenticazione e protezione Auditing e Logging Appendice [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":0,"parent":3361,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-3447","page","type-page","status-publish","hentry"],"blocksy_meta":[],"_links":{"self":[{"href":"https:\/\/cloudsandtraining.net\/site\/wp-json\/wp\/v2\/pages\/3447","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cloudsandtraining.net\/site\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cloudsandtraining.net\/site\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cloudsandtraining.net\/site\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/cloudsandtraining.net\/site\/wp-json\/wp\/v2\/comments?post=3447"}],"version-history":[{"count":10,"href":"https:\/\/cloudsandtraining.net\/site\/wp-json\/wp\/v2\/pages\/3447\/revisions"}],"predecessor-version":[{"id":4404,"href":"https:\/\/cloudsandtraining.net\/site\/wp-json\/wp\/v2\/pages\/3447\/revisions\/4404"}],"up":[{"embeddable":true,"href":"https:\/\/cloudsandtraining.net\/site\/wp-json\/wp\/v2\/pages\/3361"}],"wp:attachment":[{"href":"https:\/\/cloudsandtraining.net\/site\/wp-json\/wp\/v2\/media?parent=3447"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}