Certified in Cybersecurity (CC): Data Security & System Hardening

Cybersecurity    |    Beginner
  • 11 videos | 29m 38s
  • Includes Assessment
  • Earns a Badge
Rating 4.4 of 17 users Rating 4.4 of 17 users (17)
For many organizations, data is the most critical asset to be secured. Begin this course by exploring the data life cycle, or the different phases a piece of data goes through, from data creation to data destruction. You will focus on each of the six phases, including create, store, use, share, archive, and destroy. Then, you will learn how to log and monitor security events using modern enterprise and cloud-based solutions. Next, you will investigate encryption, hashing, and digital signing. Finally, you will discover system hardening practices like patch management. This course prepares learners for the (ISC)2 Certified in Cybersecurity exam.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Define the create phase of the data life cycle which should use the general data protection regulation (gdpr) concept of data minimization
    Define the store phase of the data life cycle, including block, object, file, and database storage solutions
    Define the use phase of the data life cycle, including data utility and a wide array of processes where raw data becomes information and knowledge
    Define the share phase of the data life cycle, which involves multiple subjects working simultaneously on data at rest, data in transit, and data in use
    Define the archive phase of the data life cycle, which is the long-term storage of data for a variety of use cases
  • Define the destroy phase of the data life cycle, also known as the destruction or disposition phase of physical and digital data and associated media
    Describe logging and monitoring of security events using modern enterprise and cloud-based solutions
    Compare encryption, hashing, and digital signing, including symmetric, asymmetric, hashed message authentication codes, and digital certificates
    Describe system hardening practices like patch management and stopping unnecessary services and ports
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 47s
    In this video, we will discover the key concepts covered in this course. FREE ACCESS
  • 2m 49s
    Upon completion of this video, you will be able to define the create phase of the data life cycle which should use the General Data Protection Regulation (GDPR) concept of data minimization. FREE ACCESS
  • Locked
    3.  Data Life Cycle Phase 2: Store
    1m 47s
    After completing this video, you will be able to define the store phase of the data life cycle, including block, object, file, and database storage solutions. FREE ACCESS
  • Locked
    4.  Data Life Cycle Phase 3: Use
    1m 53s
    Upon completion of this video, you will be able to define the use phase of the data life cycle, including data utility and a wide array of processes where raw data becomes information and knowledge. FREE ACCESS
  • Locked
    5.  Data Life Cycle Phase 4: Share
    1m 39s
    In this video, we will define the share phase of the data life cycle, which involves multiple subjects working simultaneously on data at rest, data in transit, and data in use. FREE ACCESS
  • Locked
    6.  Data Life Cycle Phase 5: Archive
    1m 46s
    After completing this video, you will be able to define the archive phase of the data life cycle, which is the long-term storage of data for a variety of use cases. FREE ACCESS
  • Locked
    7.  Data Life Cycle Phase 6: Destroy
    2m 3s
    Upon completion of this video, you will be able to define the destroy phase of the data life cycle, also known as the destruction or disposition phase of physical and digital data and associated media. FREE ACCESS
  • Locked
    8.  Logging and Monitoring Security Events
    5m 28s
    In this video, we will describe logging and monitoring of security events using modern enterprise and cloud-based solutions. FREE ACCESS
  • Locked
    9.  Encryption, Hashing, and Digital Signing
    7m 49s
    After completing this video, you will be able to compare encryption, hashing, and digital signing, including symmetric, asymmetric, hashed message authentication codes, and digital certificates. FREE ACCESS
  • Locked
    10.  System Hardening
    3m 1s
    Upon completion of this video, you will be able to describe system hardening practices like patch management and stopping unnecessary services and ports. FREE ACCESS
  • Locked
    11.  Course Summary
    37s
    In this video, we will summarize the key concepts covered in this course. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.6 of 91 users Rating 4.6 of 91 users (91)
Rating 5.0 of 4 users Rating 5.0 of 4 users (4)
Rating 4.6 of 123 users Rating 4.6 of 123 users (123)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.3 of 37 users Rating 4.3 of 37 users (37)
Rating 4.5 of 44 users Rating 4.5 of 44 users (44)
Rating 4.5 of 19 users Rating 4.5 of 19 users (19)