CompTIA CASP+: IT Governance & Security Compliance

CompTIA    |    Intermediate
  • 12 videos | 1h 7m 1s
  • Includes Assessment
  • Earns a Badge
Rating 4.5 of 87 users Rating 4.5 of 87 users (87)
IT governance involves ensuring that business and regulatory compliance needs are met by IT solutions. In this course, you'll learn to identify common data privacy standards and regulations, as well as various types of business agreements. Next, you'll learn to classify personally identifiable information using various methods including Macie for data discovery and classification. You'll explore how to use Azure Information Protection to enable DLP and tag cloud resources to facilitate resource management. You'll then examine how to securely wipe a storage device and identify common organization security policies. Lastly, you'll learn how to identify data roles and configure cloud data retention. This course is one of a collection of courses that prepares learners for the CompTIA Advanced Security Practitioner (CASP+) CAS-004 exam.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Identify common data privacy standards
    Recognize various types of business agreement documents
    Determine what constitutes pii
    Use macie for data discovery and classification
    Use azure information protection to enable dlp
  • Tag cloud resources to facilitate resource management
    Recognize various data security techniques such as tokenization and obfuscation
    Use software wiping tools to securely remove data
    Identify common organizational security policies
    Differentiate between data roles
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 46s
    This course shows you how to identify common data privacy standards and regulations. Classify personally identifiable information. Explore how to use Azure Information Protection to enable DLP. Examine how to securely wipe a storage device. Identify data roles. Configure cloud data retention. FREE ACCESS
  • 7m 45s
    Review data privacy standards and HIPAA regulations. Identify sensitive information types, such as PII, EHR, EMR, and PHR. Examine the General Data Protection Regulation (GDPR), COPPA, and PCI DSS security requirements. FREE ACCESS
  • Locked
    3.  IT Services and Business Agreements
    7m 36s
    This video examines various types of business agreement documents. Review IT services and business agreements, outsourcing business tasks, non-disclosure agreements, the Microsoft Azure storage account service level agreement (SLA), and the interconnection security agreement (ISA). FREE ACCESS
  • Locked
    4.  Personally Identifiable Information
    5m 35s
    Determine what constitutes PII through review of examples of non-technology and technology PII, sensitive personal information (SPI), and protected health information (PHI). Review what a PII/PHI security control periodic audit entails. FREE ACCESS
  • Locked
    5.  Classifying Data with Amazon Macie
    7m 2s
    Explore how to discover and classify sensitive data via Amazon Macie. Work with sample files to identify data sovereignty (legal jurisdiction). Determine the scope of a task for Macie. Specify custom data identifiers. Add optional descriptions and execute a search. FREE ACCESS
  • Locked
    6.  Preventing Data Exfiltration with Microsoft Azure
    6m 9s
    Explore how to use Microsoft Azure Information Protection (AIP) to manage data loss protection (DLP). Set up a new protection template label. Specify settings, such as name, description, color, document and email permissions, protection levels, users, and groups. FREE ACCESS
  • Locked
    7.  Tagging Cloud Resources
    6m 37s
    See how to tag cloud resources, such as virtual machines, storage accounts, or web applications, to facilitate Microsoft Azure resource management. Use the Microsoft Azure dashboard to apply a tag to a virtual machine. Manage subscriptions and cost centers. FREE ACCESS
  • Locked
    8.  Data Security Techniques
    7m 43s
    Explore various data security techniques, such as tokenization and obfuscation. Discover and inventory your data with metadata to tag assets. Apply regular expressions or use Microsoft FSRM to discover and automatically classify data in the cloud. Follow DLP policies and watermark content with DRM. FREE ACCESS
  • Locked
    9.  Securely Wiping a Storage Device
    4m 19s
    Review how to securely wipe a storage device clean, based on NIST publication SP 800-88, Guidelines for Media Sanitization. Review how to use the Disk Scrubber utility from Summit Computer Networks, as an example of a way to safely expunge sensitive information that is no longer needed. FREE ACCESS
  • Locked
    10.  Organizational Security Policies
    6m 28s
    Identify common organizational security policies that guide security tasks within an organization for all levels of employees. Secure assets. Follow CMMI, PCI DSS, and Pipid policies, as well as configuration and change management policies with a CMDB for various systems, media, and devices. FREE ACCESS
  • Locked
    11.  Data Roles and Data Sovereignty
    4m 51s
    Review data role and data sovereignty concepts as they may apply across regions to data owners and data custodians. Explore the role of a data protection officer (DPO), who ensures data privacy compliance. FREE ACCESS
  • Locked
    12.  Course Summary
    1m 12s
    This course showed you how to identify common data privacy standards and regulations. Classify personally identifiable information. Explore how to use Azure Information Protection to enable DLP. Examine how to securely wipe a storage device. Identify data roles. Configure cloud data retention. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.4 of 17 users Rating 4.4 of 17 users (17)
Rating 4.4 of 38 users Rating 4.4 of 38 users (38)
Rating 4.5 of 59 users Rating 4.5 of 59 users (59)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.5 of 59 users Rating 4.5 of 59 users (59)
Rating 4.4 of 196 users Rating 4.4 of 196 users (196)
Rating 4.1 of 39 users Rating 4.1 of 39 users (39)