CompTIA IT Fundamentals: Privacy & Encryption
IT Fundamentals
| Beginner
- 15 videos | 1h 28m 16s
- Includes Assessment
- Earns a Badge
In an information age, privacy and security are of paramount importance. We've seen numerous examples of the damage done when information is compromised. With this in mind, organizations spend vast resources to keep information safe and secure for good reason. In this course, you will learn about privacy and encryption, beginning with the basics of Internet and computing privacy. Then you'll explore software and network privacy considerations, security policies and procedures, regulations and considerations for handling information, and password best practices. Finally, you'll delve into encryption technologies and the importance of protecting data at rest and data in transit. This course helps prepare learners for the CompTIA IT Fundamentals (ITF+) certification exam, FC0-U61.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseProvide an overview of internet privacy concernsOutline expectations for privacy when using social networking sitesOutline expectations for privacy when using emailOutline expectations for privacy when sharing filesOutline expectations for privacy when using instant messagingOutline expectations for privacy when using software, including desktop and mobile applicationsOutline expectations for privacy when using computer networks
-
Identify common methods for establishing and using security and privacy policiesOutline regulations protecting private information and common methods for handling confidential informationIdentify best practices for enforcing password policyProvide an overview of computer encryption, its basic functionality, and why it is neededProvide an overview of data at rest and how it can be protected by encryptionProvide an overview of data in transit and how it can be protected by encryptionSummarize the key concepts covered in this course
IN THIS COURSE
-
1m 7sIn this video, we will discover the key concepts covered in this course. FREE ACCESS
-
7m 21sUpon completion of this video, you will be able to provide an overview of internet privacy concerns. FREE ACCESS
-
5m 39sAfter completing this video, you will be able to outline expectations for privacy when using social networking sites. FREE ACCESS
-
7m 31sUpon completion of this video, you will be able to outline expectations for privacy when using email. FREE ACCESS
-
7m 12sAfter completing this video, you will be able to outline expectations for privacy when sharing files. FREE ACCESS
-
5m 7sUpon completion of this video, you will be able to outline expectations for privacy when using instant messaging. FREE ACCESS
-
6m 55sAfter completing this video, you will be able to outline expectations for privacy when using software, including desktop and mobile applications. FREE ACCESS
-
4m 48sUpon completion of this video, you will be able to outline expectations for privacy when using computer networks. FREE ACCESS
-
6m 2sUpon completion of this video, you will be able to identify common methods for establishing and using security and privacy policies. FREE ACCESS
-
6m 31sAfter completing this video, you will be able to outline regulations protecting private information and common methods for handling confidential information. FREE ACCESS
-
8m 28sUpon completion of this video, you will be able to identify best practices for enforcing password policy. FREE ACCESS
-
6m 42sAfter completing this video, you will be able to provide an overview of computer encryption, its basic functionality, and why it is needed. FREE ACCESS
-
5m 40sUpon completion of this video, you will be able to provide an overview of data at rest and how it can be protected by encryption. FREE ACCESS
-
8m 29sAfter completing this video, you will be able to provide an overview of data in transit and how it can be protected by encryption. FREE ACCESS
-
44sIn this video, we will summarize the key concepts covered in this course. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.