CompTIA Security+: Data Protection Concepts & Strategies

CompTIA Security+    |    Beginner
  • 10 videos | 26m 47s
  • Includes Assessment
  • Earns a Badge
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
It is an understatement to declare that society is rapidly becoming a data-driven and service-oriented. Data protection and security is a key aspect of modern IT security management. In this course, we will begin by exploring data states, classification, types, and lifecycles. Then we will examine considerations for securing data including geographic and cultural restrictions, encryptions, and hashing. Finally, we will look at masking, obfuscation, and tokenization as well as segmentation and compartmentalization. This course is part of a series that prepares you for the CompTIA Security+ (SY0-701) exam.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Compare data at rest, data in transit, and data in use
    Compare data classifications including sensitive, confidential, public, restricted, private, and critical
    Outline data types such as regulated, trade secrets, intellectual property, protected health information (phi), personally identifiable information (pii), legal information, financial information, and human- and non-human readable data
    Identify the stages of the data life cycle
  • Outline geographic and cultural data issues as they relate to data security
    Provide and overview encryption and hashing and how they are used to protect data
    Outline how to use masking, obfuscation, and tokenization to protect data
    Outline how to use segmentation and compartmentalization to protect data
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 38s
    In this video, we will discover the key concepts covered in this course. FREE ACCESS
  • 2m 20s
    After completing this video, you will be able to compare data at rest, data in transit, and data in use. FREE ACCESS
  • Locked
    3.  Data Classifications
    2m 52s
    Upon completion of this video, you will be able to compare data classifications including sensitive, confidential, public, restricted, private, and critical. FREE ACCESS
  • Locked
    4.  Data Types
    2m 15s
    After completing this video, you will be able to outline data types such as regulated, trade secrets, intellectual property, Protected Health Information (PHI), personally identifiable information (PII), legal information, financial information, and human- and non-human readable data. FREE ACCESS
  • Locked
    5.  Data Life Cycle
    6m 27s
    Upon completion of this video, you will be able to identify the stages of the data life cycle. FREE ACCESS
  • Locked
    6.  Securing Data: Geographic and Cultural Restrictions
    1m 48s
    After completing this video, you will be able to outline geographic and cultural data issues as they relate to data security. FREE ACCESS
  • Locked
    7.  Securing Data: Encryption and Hashing
    2m 48s
    Upon completion of this video, you will be able to provide and overview encryption and hashing and how they are used to protect data. FREE ACCESS
  • Locked
    8.  Securing Data: Masking, Obfuscation, Tokenization
    4m 20s
    After completing this video, you will be able to outline how to use masking, obfuscation, and tokenization to protect data. FREE ACCESS
  • Locked
    9.  Securing Data: Segmentation and Compartmentalization
    2m 46s
    Upon completion of this video, you will be able to outline how to use segmentation and compartmentalization to protect data. FREE ACCESS
  • Locked
    10.  Course Summary
    34s
    In this video, we will summarize the key concepts covered in this course. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.7 of 3 users Rating 4.7 of 3 users (3)
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
Rating 5.0 of 2 users Rating 5.0 of 2 users (2)