CompTIA Security+: Data Protection Concepts & Strategies
CompTIA Security+
| Beginner
- 10 videos | 26m 47s
- Includes Assessment
- Earns a Badge
It is an understatement to declare that society is rapidly becoming a data-driven and service-oriented. Data protection and security is a key aspect of modern IT security management. In this course, we will begin by exploring data states, classification, types, and lifecycles. Then we will examine considerations for securing data including geographic and cultural restrictions, encryptions, and hashing. Finally, we will look at masking, obfuscation, and tokenization as well as segmentation and compartmentalization. This course is part of a series that prepares you for the CompTIA Security+ (SY0-701) exam.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseCompare data at rest, data in transit, and data in useCompare data classifications including sensitive, confidential, public, restricted, private, and criticalOutline data types such as regulated, trade secrets, intellectual property, protected health information (phi), personally identifiable information (pii), legal information, financial information, and human- and non-human readable dataIdentify the stages of the data life cycle
-
Outline geographic and cultural data issues as they relate to data securityProvide and overview encryption and hashing and how they are used to protect dataOutline how to use masking, obfuscation, and tokenization to protect dataOutline how to use segmentation and compartmentalization to protect dataSummarize the key concepts covered in this course
IN THIS COURSE
-
38sIn this video, we will discover the key concepts covered in this course. FREE ACCESS
-
2m 20sAfter completing this video, you will be able to compare data at rest, data in transit, and data in use. FREE ACCESS
-
2m 52sUpon completion of this video, you will be able to compare data classifications including sensitive, confidential, public, restricted, private, and critical. FREE ACCESS
-
2m 15sAfter completing this video, you will be able to outline data types such as regulated, trade secrets, intellectual property, Protected Health Information (PHI), personally identifiable information (PII), legal information, financial information, and human- and non-human readable data. FREE ACCESS
-
6m 27sUpon completion of this video, you will be able to identify the stages of the data life cycle. FREE ACCESS
-
1m 48sAfter completing this video, you will be able to outline geographic and cultural data issues as they relate to data security. FREE ACCESS
-
2m 48sUpon completion of this video, you will be able to provide and overview encryption and hashing and how they are used to protect data. FREE ACCESS
-
4m 20sAfter completing this video, you will be able to outline how to use masking, obfuscation, and tokenization to protect data. FREE ACCESS
-
2m 46sUpon completion of this video, you will be able to outline how to use segmentation and compartmentalization to protect data. FREE ACCESS
-
34sIn this video, we will summarize the key concepts covered in this course. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.