CISSP 2024: Data Lifecycle, Controls, & Compliance
CISSP 2024
| Expert
- 12 videos | 34m 27s
- Includes Assessment
- Earns a Badge
Data is one of the highest-priority assets that most organizations possess. For CISSP professionals, understanding the data lifecycle to ensure that security measures are applied at each stage to protect sensitive information, controls, and compliance is crucial. Together, these elements form the backbone of a robust security strategy, ensuring that data is managed securely throughout its lifecycle, mitigating risks through effective controls, and meeting legal and regulatory requirements. Begin this course by exploring various data roles like owner, controllers, and processors, as well as in use, in transit, and at rest data states. Then you will delve into the phases of the data lifecycle, including data collection, data location, data maintenance, data retention and remanence, and data destruction. Next, you will compare data scoping to data tailoring and learn how to select appropriate data security and privacy standards. Finally, you will focus on data protection methods, including digital rights management (DRM), data loss prevention (DLP), and cloud access security brokers (CASBs). This course helps prepare learners for the Certified Information Systems Security Professional (CISSP) exam.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseCompare data roles, such as owners, controllers, custodians, processors, and users/subjectsCompare in use, in transit, and at rest data statesDefine the data collection phase of the data lifecycleDescribe the data phase of the data lifecycleProvide an overview of data maintenance and management activities in the data lifecycle
-
Describe data retention and remanence in the data lifecycle, including end of life (eol) and end of supportDescribe data destruction methods in the data lifecycleCompare data scoping to data tailoringSelect from various data security and privacy standardsOutline data protection methods, including digital rights management (drm), data loss prevention (dlp), and cloud access security brokers (casbs)Summarize the key concepts covered in this course
IN THIS COURSE
-
29sIn this video, we will discover the key concepts covered in this course. FREE ACCESS
-
6m 3sAfter completing this video, you will be able to compare data roles, such as owners, controllers, custodians, processors, and users/subjects. FREE ACCESS
-
2m 19sUpon completion of this video, you will be able to compare in use, in transit, and at rest data states. FREE ACCESS
-
3m 36sAfter completing this video, you will be able to define the data collection phase of the data lifecycle. FREE ACCESS
-
2m 27sUpon completion of this video, you will be able to describe the data phase of the data lifecycle. FREE ACCESS
-
3m 31sAfter completing this video, you will be able to provide an overview of data maintenance and management activities in the data lifecycle. FREE ACCESS
-
3m 27sUpon completion of this video, you will be able to describe data retention and remanence in the data lifecycle, including end of life (EOL) and end of support. FREE ACCESS
-
1m 31sAfter completing this video, you will be able to describe data destruction methods in the data lifecycle. FREE ACCESS
-
1m 39sUpon completion of this video, you will be able to compare data scoping to data tailoring. FREE ACCESS
-
2m 45sIn this video, find out how to select from various data security and privacy standards. FREE ACCESS
-
6m 7sAfter completing this video, you will be able to outline data protection methods, including digital rights management (DRM), data loss prevention (DLP), and cloud access security brokers (CASBs). FREE ACCESS
-
33sIn this video, we will summarize the key concepts covered in this course. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.