CompTIA CASP+: IT Governance & Security Compliance
CompTIA
| Intermediate
- 12 videos | 1h 7m 1s
- Includes Assessment
- Earns a Badge
IT governance involves ensuring that business and regulatory compliance needs are met by IT solutions. In this course, you'll learn to identify common data privacy standards and regulations, as well as various types of business agreements. Next, you'll learn to classify personally identifiable information using various methods including Macie for data discovery and classification. You'll explore how to use Azure Information Protection to enable DLP and tag cloud resources to facilitate resource management. You'll then examine how to securely wipe a storage device and identify common organization security policies. Lastly, you'll learn how to identify data roles and configure cloud data retention. This course is one of a collection of courses that prepares learners for the CompTIA Advanced Security Practitioner (CASP+) CAS-004 exam.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseIdentify common data privacy standardsRecognize various types of business agreement documentsDetermine what constitutes piiUse macie for data discovery and classificationUse azure information protection to enable dlp
-
Tag cloud resources to facilitate resource managementRecognize various data security techniques such as tokenization and obfuscationUse software wiping tools to securely remove dataIdentify common organizational security policiesDifferentiate between data rolesSummarize the key concepts covered in this course
IN THIS COURSE
-
1m 46sThis course shows you how to identify common data privacy standards and regulations. Classify personally identifiable information. Explore how to use Azure Information Protection to enable DLP. Examine how to securely wipe a storage device. Identify data roles. Configure cloud data retention. FREE ACCESS
-
7m 45sReview data privacy standards and HIPAA regulations. Identify sensitive information types, such as PII, EHR, EMR, and PHR. Examine the General Data Protection Regulation (GDPR), COPPA, and PCI DSS security requirements. FREE ACCESS
-
7m 36sThis video examines various types of business agreement documents. Review IT services and business agreements, outsourcing business tasks, non-disclosure agreements, the Microsoft Azure storage account service level agreement (SLA), and the interconnection security agreement (ISA). FREE ACCESS
-
5m 35sDetermine what constitutes PII through review of examples of non-technology and technology PII, sensitive personal information (SPI), and protected health information (PHI). Review what a PII/PHI security control periodic audit entails. FREE ACCESS
-
7m 2sExplore how to discover and classify sensitive data via Amazon Macie. Work with sample files to identify data sovereignty (legal jurisdiction). Determine the scope of a task for Macie. Specify custom data identifiers. Add optional descriptions and execute a search. FREE ACCESS
-
6m 9sExplore how to use Microsoft Azure Information Protection (AIP) to manage data loss protection (DLP). Set up a new protection template label. Specify settings, such as name, description, color, document and email permissions, protection levels, users, and groups. FREE ACCESS
-
6m 37sSee how to tag cloud resources, such as virtual machines, storage accounts, or web applications, to facilitate Microsoft Azure resource management. Use the Microsoft Azure dashboard to apply a tag to a virtual machine. Manage subscriptions and cost centers. FREE ACCESS
-
7m 43sExplore various data security techniques, such as tokenization and obfuscation. Discover and inventory your data with metadata to tag assets. Apply regular expressions or use Microsoft FSRM to discover and automatically classify data in the cloud. Follow DLP policies and watermark content with DRM. FREE ACCESS
-
4m 19sReview how to securely wipe a storage device clean, based on NIST publication SP 800-88, Guidelines for Media Sanitization. Review how to use the Disk Scrubber utility from Summit Computer Networks, as an example of a way to safely expunge sensitive information that is no longer needed. FREE ACCESS
-
6m 28sIdentify common organizational security policies that guide security tasks within an organization for all levels of employees. Secure assets. Follow CMMI, PCI DSS, and Pipid policies, as well as configuration and change management policies with a CMDB for various systems, media, and devices. FREE ACCESS
-
4m 51sReview data role and data sovereignty concepts as they may apply across regions to data owners and data custodians. Explore the role of a data protection officer (DPO), who ensures data privacy compliance. FREE ACCESS
-
1m 12sThis course showed you how to identify common data privacy standards and regulations. Classify personally identifiable information. Explore how to use Azure Information Protection to enable DLP. Examine how to securely wipe a storage device. Identify data roles. Configure cloud data retention. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.