Data Loss Prevention
3.8 (8 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
79 students enrolled
Wishlisted Wishlist

Please confirm that you want to add Data Loss Prevention to your Wishlist.

Add to Wishlist

Data Loss Prevention

An introductory course about understanding Data Loss Prevention and the different ways of recovering data.
3.8 (8 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
79 students enrolled
Last updated 3/2015
English
Price: $50
30-Day Money-Back Guarantee
Includes:
  • 1.5 hours on-demand video
  • 1 min on-demand audio
  • 12 Supplemental Resources
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
What Will I Learn?
  • Learn Data Loss and Data Recovery.
  • Know about Data Loss Prevention.
  • Understand Data Categories.
  • Be aware of the Data Life cycle.
  • Learn Computer and Cloud Security.
  • Understand and know the different Cyber Security Standards.
View Curriculum
Requirements
  • Basic understanding of the IT industry
  • Knowledge of the English language
Description

Data Loss Prevention (DLP) is a computer security term referring to systems that identify, monitor, and protect data in use, data in motion, and data at rest. Experts accomplish this through deep content inspection, contextual security analysis of transaction, and with a centralized management framework.

This course will begin with a discussion of topics relating to Data Loss Prevention such as Data Loss, Data Recovery, Data Categories, and the Data Life cycle. Computer Security, Cloud Security, and Cyber Security Standards are other topics that will be included in this course.

Who is the target audience?
  • Businesses looking to implement DLP software tools for security purposes, IT Professionals researching DLP software services and computer security systems.
  • Managers wanting to be informed about the importance of data protection.
Students Who Viewed This Course Also Viewed
Curriculum For This Course
Expand All 66 Lectures Collapse All 66 Lectures 04:49:55
+
Data Loss and Recovery
9 Lectures 11:45

In this lecture, we'll discuss some objectives aimed at showing what you can expect to learn from this course.

.

Section Outline


Lecture 2: Data Loss

Lecture 3: Types of Data Loss

Lecture 4: Number Involved in Data Loss

Lecture 5: How to Respond to Data Loss

Lecture 6: Scenarios in Data Recovery

Lecture 7: Backup Strategy for Data Recovery

Lecture 8: Foundation of DLP

Preview 00:20

This lecture will define and explain data loss.

Preview 01:22

This lecture will identify the ways of losing data.

.

Lecture outline:

0:00    Intentional Action
0:08    Unintentional Action
0:24    Disaster
0:33    Failure
1:25    Crime
Preview 02:02

This lecture will show how much data is lost in different areas especially at the work place.

Preview 01:05

This lecture will explain our response and actions towards data loss.

.

Lecture outline:

0:00    Introduction to Data Recovery
0:36    Defining Data Recovery
Preview 01:30

This discussion will focus on the different scenarios in data recovery.

Preview 02:04

This lecture will discuss a backup strategy to recover data.

Backup Strategy for Data Recovery
01:57

This lecture will talk about the foundation of data loss prevention.

Foundation of DLP
01:25

Section 1 - Quiz
6 questions

This PDF file contains Section 1 of this course. You can download the complete e book at the end of this course.

Reading Assignment Section 1
9 pages
+
Overview of Data Loss Prevention
12 Lectures 10:54

In this lecture, we'll discuss some objectives aimed at showing what you can expect to learn from this course.

.

Section Outline


Lecture 11: Data Loss Prevention

Lecture 12: Introduction to Common Themes in DLP

Lecture 13: People

Lecture 14: Process

Lecture 15: Technology

Lecture 16: DLP in Common Themes

Lecture 17: Need for DLP

Lecture 18: Risks in DLP

Lecture 19: Areas of Data Loss

Lecture 20: DLP vs Data Leakage

Preview 00:20

This lecture will explain data loss prevention and show the different names to describe DLP.

.

Lecture outline:

0:00    Introduction to Data Loss Prevention
0:48    Defining Data Loss Prevention
2:46    Different Names to Describe DLP
Data Loss Prevention
05:02

This lecture will discuss the themes that capture the common and recurring reasons for data loss.

Introduction to Common Themes in DLP
00:15

This lecture will include one of the themes where data loss happens, namely the very people using the data.

.

Lecture outline:

0:00    Lack of Awareness
0:06    Lack of Accountability
0:25    Lack of User Responsibility for Their Actions
People
00:34

This lecture will include one of the themes where data loss happens, namely the process included in accessing the data.

.

Lecture outline:

0:00    Lack of Data Usage Policies / Guidance
0:26    Lack of Data Transmission Procedures
0:36    Lack of Data Usage Monitoring
Process
00:51

This lecture will include one of the themes where data loss happens, namely the technology being used to access the data.

.

Lecture outline:

0:00    Lack of Flexibility in Remote Connectivity
0:16    No content-aware DLP Tools
0:27    Lack of Secure Communication Platforms
Technology
00:37

This lecture will discuss how data loss can be minimized, if not avoided.

DLP in Common Themes
00:13

This lecture will cover the need for DLP.

Need for DLP
00:55

This discussion will address the different risks involved in preventing data loss.

Risks in DLP
01:19

This discussion will center on the common areas where data is usually lost.

Areas of Data Loss
00:22

This lecture will identify the difference between DLP and data leakage.

DLP vs Data Leakage
00:26

Section 2 - Quiz
6 questions

This PDF file contains Section 2 of this course. You can download the complete e book at the end of this course.

Reading Assignment Section 2
8 pages
+
Data Categories and Lifecylce
10 Lectures 11:40

In this lecture, we'll discuss some objectives aimed at showing what you can expect to learn from this course.

.

Section Outline


Lecture 23: Categories in DLP

Lecture 24: Data Lifecycle

Lecture 25: Data in Motion

Lecture 26: Data in Use

Lecture 27: Data at Rest

Lecture 28: Data Breach

Lecture 29: Information Security

Lecture 30: Secuirty Awareness

Preview 00:20

This lecture will discuss the different categories in DLP.

.

Lecture outline:

0:00    Introduction to the Categories of DLP
0:17    Standard Security Measures
1:02    Advanced Security Measures
1:25    Designated DLP Solutions
Categories of DLP
02:05

This lecture will explain the process in data lifecycle.

Data Lifecycle
00:21

This lecture will discuss one of the different categories, namely Data in Motion, involved in the data lifecycle process.

Data in Motion
01:15

This lecture will discuss one of the different categories, namely Data in Use, involved in the data lifecycle process.

Data in Use
01:15

This lecture will discuss one of the different categories, namely Data at Rest, involved in the data lifecycle process.

Data at Rest
02:30

This discussion will define one of the commonly used terms in DLP: data breach.

Data Breach
02:07

This discussion will define one of the commonly used terms in DLP: information security.

Information Security
01:02

This discussion will define one of the commonly used terms in DLP: security awareness.

Security Awareness
00:45

Section 3 - Quiz
6 questions

This PDF file contains Section 3 of this course. You can download the complete e book at the end of this course.

Reading Assignment Section 3
9 pages
+
Computer Security
7 Lectures 17:33

In this lecture, we'll discuss some objectives aimed at showing what you can expect to learn from this course.

.

Section Outline


Lecture 33: Introduction to Computer Security

Lecture 34: Secure OS

Lecture 35: Importance of Computer Security

Lecture 36: Computer Security Threats

Lecture 37: Improving Computer Security

Preview 00:26

This lecture will introduce security in computers.

Introduction to Computer Security
02:10

This lecture will explain how the computer OS is important in computer security.

Secure OS
05:00

This lecture will talk about the importance of computer security.

Importance of Computer Security
02:19

This lecture will identify the threats that breach the security of our computers.

.

Lecture outline:

0:00    Introduction to Computer Security Threats
0:23    Computer Virus Threats
0:50    Spyware Threats
1:04    Hackers and Predators
1:23    Phishing Threats
Computer Security Threats
01:37

This discussion will focus on the different ways on improving the security on our computers.

.

Lecture outline:

0:00    Connect to a Secure Network
0:50    Enable and Configure a Firewall
1:27    Install and Use Antivirus and Antispyware Software
2:29    Secure Your Web Browser
3:51    Use Good Security Practices
Improving Computer Security
06:01

Section 4 - Quiz
6 questions

This PDF file contains Section 4 of this course. You can download the complete e book at the end of this course.

Reading Assignment Section 4
10 pages
+
Cloud Security
7 Lectures 17:15

In this lecture, we'll discuss some objectives aimed at showing what you can expect to learn from this course.

.

Section Outline


Lecture 40: Introduction to Cloud Security

Lecture 41: Security Issues

Lecture 42: Security Controls

Lecture 43: Dimensions of Cloud Security

Lecture 44: Key Security Issues

Preview 00:24

This lecture will introduce security in the cloud.

Introduction to Cloud Security
00:29

This lecture will explain the security issues involved in the cloud.

Security Issues
01:27

This lecture will identify the different security controls involved in securing the cloud.

.

Lecture outline:

0:00    Introduction to Security Controls
0:35    Detective Controls
0:52    Deterrent Controls
3:03    Preventive Controls
3:47    Corrective Controls
Secuirty Controls
04:08

This lecture will explain the dimensions of cloud security and its three general areas.

Dimensions of Cloud Security
00:27

This discussion will address the security issues which are critical in securing the cloud.

.

Lecture outline:

0:00    Introduction to the Key Security Issues
0:41    Internal Clouds are not Inherently Secure
2:45    Companies Lack Security Visibility and Risk Awareness
4:53    Sensitive Information Needs Safer Storage
6:52    Apps aren't Secure
8:49    Authentication and Authorization Must be more Robust
Key Security Issues
10:20

Section 5 - Quiz
6 questions

This PDF file contains Section 5 of this course. You can download the complete e book at the end of this course.

Reading Assignment Section 5
10 pages
+
Data Loss Prevention Solutions
5 Lectures 17:49

In this lecture, we'll discuss some objectives aimed at showing what you can expect to learn from this course.

.

Section Outline


Lecture 47: Introduction to DLP Solutions

Lecture 48: DLP Features vs DLP Solutions

Lecture 49: Things to Consider in DLP Solutions

Preview 00:22

DLP solutions both protect sensitive data and provide insight into the use of content within the enterprise. This lecture will discuss these solutions.

Introduction to DLP Solutions
00:42

This lecture will identify the difference between DLP features and DLP solutions.

DLP Features vs DLP Solutions
02:45

This discussion will focus on some of the things to consider to have an effective DLP.

.

Lecture outline:

0:00    Identify and Prioritize
2:25    Comprehensive Accuracy
5:06    Insist of Pre-built Policies
6:35    Protect More
7:26    Respond to Each Incident
8:52    Optimize Response Process
10:43   Education and Self-Remediation
11:59   Implement an Architecture
Things to Consider in DLP Solutions
14:00

Section 6 - Quiz
6 questions

This PDF file contains Section 6 of this course. You can download the complete e book at the end of this course.

Reading Assignment Section 6
9 pages
+
Cyber Secuirty Standards
10 Lectures 17:32

In this lecture, we'll discuss some objectives aimed at showing what you can expect to learn from this course.

.

Section Outline


Lecture 52: Introduction to Cloud Security

Lecture 53: Security Issues

Lecture 54: Security Controls

Lecture 55: Dimensions of Cloud Security

Lecture 56: Key Security Issues

Lecture 57: Dimensions of Cloud Security

Lecture 58: Key Security Issues

Lecture 59: Other Standards

Preview 00:21

This lecture will introduce the standards involved in cyber security.

Introduction to Cyber Secuirty Standards
00:34

This lecture will discuss the history of cyber security standards.

History of Cyber Security Standards
01:46

This discussion will focus on one of the standards in cyber security, namely the Standard of Good Practice.

Standard of Good Practice
00:57

This discussion will focus on one of the standards in cyber security, namely the ISO/IEC 27002.

ISO/IEC 27002
02:37

This discussion will focus on one of the standards in cyber security, namely the ISO 15408.

ISO 15408
01:02

This discussion will focus on one of the standards in cyber security, namely the RFC 2196.

RFC 2196
00:31

This discussion will focus on one of the standards in cyber security, namely the IEC/ISA 62443.

IEC/ISA 62443
02:19

This discussion will focus on the other standards involved in cyber security.

.

Lecture outline:

0:00    ISO/IEC 13335-1:2004
0:27    ISO/IEC TR 15443-1:2005
0:50    ISO/IEC 15816:2002
1:13    ISO/IEC TR 15947:2002
1:50    ISO/IEC 15408-1/2/3:2005
2:49    ISO/IEC 17799:2005
3:21    ISO/IEC TR 15446:2004
3:57    ISO/IEC 18028:2006
4:41    ISO/IEC 27001:2005
5:26    ISO/IEC TR 18044:2004
6:09    ISO/TR 13569:2005
6:38    ISO/IEC 18045:2005
Other Standards
07:25

Section 7 - Quiz
6 questions

This PDF file contains Section 7 of this course. You can download the complete e book at the end of this course.

Reading Assignment Section 7
9 pages
+
Course Resources
3 Lectures 00:00

This e book contains the entire Data Loss Prevention course in a PDF format.

Data Loss Prevention Complete Certification Kit Book
108 pages

This e book is a list of terms and definitions often used in the field of Data Loss Prevention.

Data Loss Prevention Glossary of Terms
3 pages

This PDF file contains all the answers to all the quizzes in each section of this course.

Quiz Answer Sheet
7 pages
+
Data Loss Prevention Certification
3 Lectures 01:27

Now that you've finished your Udemy course, - you are eligible to sit your official Certification exam.

Certification is not mandatory.

Once you've completed the course, email our exam department at exams@artofservice.com.au to purchase your exam voucher and sit your final exam.

. Access includes a step-by-step procedure on how to take the final exam and how to obtain your exam certification.

You will receive a PDF certificate through your email upon passing the examination.

Final Exam
1 page

We are always in the process of improving our courses and procedures for a better learning experience for our students. Your input is very important to us.

Follow the step-by-step procedure on taking the evaluation and receiving your certificate of completion.

Evaluation Form
1 page

A final message from our CEO.

Conclusion - Final Lecture
01:27
About the Instructor
The Art Of Service
3.4 Average rating
386 Reviews
4,783 Students
57 Courses
Quality education for Career Driven IT Professionals

What drives us?

In one word? YOU

You are front, center and behind every decision we make in our business.

  • You are starting out in the IT industry
  • You are serious about your career
  • You need certifications on your resume to get that first interview

For you we created the Foundation level courses as well as the Core Series for IT

  • You are an IT Professional with a proven career
  • You need to stay in touch with changes in the industry
  • You need to continue to show your value to the business to ensure your job is secure
  • You want to find out what else would make your IT career more solid

For you we created the Specialist and Intermediate level courses as well as the Core Series for IT

  • You are implementing Processes and methodologies in your company
  • You are managing a team of people and need to look good
  • You started your own business and are looking for template documents to ‘hit the ground running’
  • You need to present on a subject at the next team meeting and are not quite sure where to start

For you we created the Toolkits as well as the Core Series for IT


Our motto:
Every Career driven IT Professional needs to be able to afford quality IT educational materials to stay relevant in their job, irrespective of current position, budget or geographical location.

We do most of the work behind the scenes so that you can focus on your professional education and your career within the IT industry.

We see it as our job to ensure we give you the most up to date information you need to succeed in achieving that goal at a price-point that is makes it accessible to most professionals.