Certified in Cybersecurity (CC): Data Security & System Hardening
Cybersecurity
| Beginner
- 11 videos | 29m 38s
- Includes Assessment
- Earns a Badge
For many organizations, data is the most critical asset to be secured. Begin this course by exploring the data life cycle, or the different phases a piece of data goes through, from data creation to data destruction. You will focus on each of the six phases, including create, store, use, share, archive, and destroy. Then, you will learn how to log and monitor security events using modern enterprise and cloud-based solutions. Next, you will investigate encryption, hashing, and digital signing. Finally, you will discover system hardening practices like patch management. This course prepares learners for the (ISC)2 Certified in Cybersecurity exam.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseDefine the create phase of the data life cycle which should use the general data protection regulation (gdpr) concept of data minimizationDefine the store phase of the data life cycle, including block, object, file, and database storage solutionsDefine the use phase of the data life cycle, including data utility and a wide array of processes where raw data becomes information and knowledgeDefine the share phase of the data life cycle, which involves multiple subjects working simultaneously on data at rest, data in transit, and data in useDefine the archive phase of the data life cycle, which is the long-term storage of data for a variety of use cases
-
Define the destroy phase of the data life cycle, also known as the destruction or disposition phase of physical and digital data and associated mediaDescribe logging and monitoring of security events using modern enterprise and cloud-based solutionsCompare encryption, hashing, and digital signing, including symmetric, asymmetric, hashed message authentication codes, and digital certificatesDescribe system hardening practices like patch management and stopping unnecessary services and portsSummarize the key concepts covered in this course
IN THIS COURSE
-
47sIn this video, we will discover the key concepts covered in this course. FREE ACCESS
-
2m 49sUpon completion of this video, you will be able to define the create phase of the data life cycle which should use the General Data Protection Regulation (GDPR) concept of data minimization. FREE ACCESS
-
1m 47sAfter completing this video, you will be able to define the store phase of the data life cycle, including block, object, file, and database storage solutions. FREE ACCESS
-
1m 53sUpon completion of this video, you will be able to define the use phase of the data life cycle, including data utility and a wide array of processes where raw data becomes information and knowledge. FREE ACCESS
-
1m 39sIn this video, we will define the share phase of the data life cycle, which involves multiple subjects working simultaneously on data at rest, data in transit, and data in use. FREE ACCESS
-
1m 46sAfter completing this video, you will be able to define the archive phase of the data life cycle, which is the long-term storage of data for a variety of use cases. FREE ACCESS
-
2m 3sUpon completion of this video, you will be able to define the destroy phase of the data life cycle, also known as the destruction or disposition phase of physical and digital data and associated media. FREE ACCESS
-
5m 28sIn this video, we will describe logging and monitoring of security events using modern enterprise and cloud-based solutions. FREE ACCESS
-
7m 49sAfter completing this video, you will be able to compare encryption, hashing, and digital signing, including symmetric, asymmetric, hashed message authentication codes, and digital certificates. FREE ACCESS
-
3m 1sUpon completion of this video, you will be able to describe system hardening practices like patch management and stopping unnecessary services and ports. FREE ACCESS
-
37sIn this video, we will summarize the key concepts covered in this course. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.