Certified Information Systems Auditor (CISA) 2019: Data Storage & Malware
Expert
- 16 videos | 1h 5m 4s
- Includes Assessment
- Earns a Badge
Explore the variety of methods through which stored data can be secured and made highly available, despite realization of malware threats, as you prepare for the ISACA Certified Information Systems Auditor (CISA) exam. Key concepts covered in this 16-video course include: distinguishing between data and information how they are secured; how to define the relationship between big data and the value of data analytics; and listing methods of securing a storage area network (SAN). Next, learn to enable password authentication for Internet Small Computer Systems Interface (iSCSI) target access; to recognize common security options available with cloud storage; and to ensure that decommissioned storage media do not contain retrievable data artifacts. You will learn how to deploy Structured Query Language (SQL) Database in the Azure cloud; how to implement a database replication strategy; how to protect data with the Windows backup feature; and how to protect data by backing it up to the cloud. Finally, learn how to identify the various forms of social engineering and the related security risks, and how to implement controls that provide data availability.
WHAT YOU WILL LEARN
-
Distinguish between data and information and describe how they are securedDefine the relationship between big data and the value of data analyticsList methods of securing a sanEnable password authentication for iscsi target accessRecognize common security options available with cloud storageEnsure that decommissioned storage media does not contain retrievable data artifactsIdentify common database hardening techniquesDeploy microsoft sql database in the azure cloud
-
Implement a database replication strategyIdentify data availability strategies, including whether security controls are still in place after data recoveryProtect data using the windows backup featureProtect data by backing it up to the cloudDistinguish between malware typesIdentify the various forms of social engineering and the related security risksImplement controls that provide data availability
IN THIS COURSE
-
1m 57s
-
2m 31sIn this video, you will learn the difference between data and information and how they are secured. FREE ACCESS
-
2m 57sDuring this video, you will learn about the relationship between big data and the value of data analytics. FREE ACCESS
-
4m 24sUpon completion of this video, you will be able to list methods of securing a storage area network. FREE ACCESS
-
6m 22sIn this video, you will learn how to enable password authentication for access to an iSCSI target. FREE ACCESS
-
3m 39sUpon completion of this video, you will be able to recognize common security options available with cloud storage. FREE ACCESS
-
1m 45sIn this video, learn how to ensure that decommissioned storage media does not contain any retrievable data artifacts. FREE ACCESS
-
4m 50sDuring this video, you will learn how to identify common database hardening techniques. FREE ACCESS
-
4mDuring this video, you will learn how to deploy a Microsoft SQL Database in the Azure cloud. FREE ACCESS
-
2m 43sIn this video, you will learn how to implement a database replication strategy. FREE ACCESS
-
5m 48sIn this video, you will learn how to identify data availability strategies, including whether security controls are still in place after data recovery. FREE ACCESS
-
5m 11sIn this video, you will learn how to protect data using the Windows Backup feature. FREE ACCESS
-
4m 21sIn this video, find out how to protect data by backing it up to the cloud. FREE ACCESS
-
4m 6sFind out how to distinguish between different types of malware. FREE ACCESS
-
6m 44sDuring this video, you will learn how to identify the various forms of social engineering and the related security risks. FREE ACCESS
-
3m 46sDuring this video, you will learn how to implement controls that provide data availability. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.