Data Loss Prevention

An introductory course about understanding Data Loss Prevention and the different ways of recovering data.
3.8 (7 ratings) Instead of using a simple lifetime average, Udemy calculates a
course's star rating by considering a number of different factors
such as the number of ratings, the age of ratings, and the
likelihood of fraudulent ratings.
68 students enrolled
$19
$50
62% off
Take This Course
  • Lectures 66
  • Length 5 hours
  • Skill Level All Levels
  • Languages English
  • Includes Lifetime access
    30 day money back guarantee!
    Available on iOS and Android
    Certificate of Completion
Wishlisted Wishlist

How taking a course works

Discover

Find online courses made by experts from around the world.

Learn

Take your courses with you and learn anywhere, anytime.

Master

Learn and practice real-world skills and achieve your goals.

About This Course

Published 2/2014 English

Course Description

Data Loss Prevention (DLP) is a computer security term referring to systems that identify, monitor, and protect data in use, data in motion, and data at rest. Experts accomplish this through deep content inspection, contextual security analysis of transaction, and with a centralized management framework.

This course will begin with a discussion of topics relating to Data Loss Prevention such as Data Loss, Data Recovery, Data Categories, and the Data Life cycle. Computer Security, Cloud Security, and Cyber Security Standards are other topics that will be included in this course.

What are the requirements?

  • Basic understanding of the IT industry
  • Knowledge of the English language

What am I going to get from this course?

  • Learn Data Loss and Data Recovery.
  • Know about Data Loss Prevention.
  • Understand Data Categories.
  • Be aware of the Data Life cycle.
  • Learn Computer and Cloud Security.
  • Understand and know the different Cyber Security Standards.

What is the target audience?

  • Businesses looking to implement DLP software tools for security purposes, IT Professionals researching DLP software services and computer security systems.
  • Managers wanting to be informed about the importance of data protection.

What you get with this course?

Not for you? No problem.
30 day money back guarantee.

Forever yours.
Lifetime access.

Learn on the go.
Desktop, iOS and Android.

Get rewarded.
Certificate of completion.

Curriculum

Section 1: Data Loss and Recovery
00:20

In this lecture, we'll discuss some objectives aimed at showing what you can expect to learn from this course.

.

Section Outline


Lecture 2: Data Loss

Lecture 3: Types of Data Loss

Lecture 4: Number Involved in Data Loss

Lecture 5: How to Respond to Data Loss

Lecture 6: Scenarios in Data Recovery

Lecture 7: Backup Strategy for Data Recovery

Lecture 8: Foundation of DLP

01:22

This lecture will define and explain data loss.

02:02

This lecture will identify the ways of losing data.

.

Lecture outline:

0:00    Intentional Action
0:08    Unintentional Action
0:24    Disaster
0:33    Failure
1:25    Crime
01:05

This lecture will show how much data is lost in different areas especially at the work place.

01:30

This lecture will explain our response and actions towards data loss.

.

Lecture outline:

0:00    Introduction to Data Recovery
0:36    Defining Data Recovery
02:04

This discussion will focus on the different scenarios in data recovery.

01:57

This lecture will discuss a backup strategy to recover data.

01:25

This lecture will talk about the foundation of data loss prevention.

Section 1 - Quiz
6 questions
9 pages

This PDF file contains Section 1 of this course. You can download the complete e book at the end of this course.

Section 2: Overview of Data Loss Prevention
00:20

In this lecture, we'll discuss some objectives aimed at showing what you can expect to learn from this course.

.

Section Outline


Lecture 11: Data Loss Prevention

Lecture 12: Introduction to Common Themes in DLP

Lecture 13: People

Lecture 14: Process

Lecture 15: Technology

Lecture 16: DLP in Common Themes

Lecture 17: Need for DLP

Lecture 18: Risks in DLP

Lecture 19: Areas of Data Loss

Lecture 20: DLP vs Data Leakage

05:02

This lecture will explain data loss prevention and show the different names to describe DLP.

.

Lecture outline:

0:00    Introduction to Data Loss Prevention
0:48    Defining Data Loss Prevention
2:46    Different Names to Describe DLP
00:15

This lecture will discuss the themes that capture the common and recurring reasons for data loss.

00:34

This lecture will include one of the themes where data loss happens, namely the very people using the data.

.

Lecture outline:

0:00    Lack of Awareness
0:06    Lack of Accountability
0:25    Lack of User Responsibility for Their Actions
00:51

This lecture will include one of the themes where data loss happens, namely the process included in accessing the data.

.

Lecture outline:

0:00    Lack of Data Usage Policies / Guidance
0:26    Lack of Data Transmission Procedures
0:36    Lack of Data Usage Monitoring
00:37

This lecture will include one of the themes where data loss happens, namely the technology being used to access the data.

.

Lecture outline:

0:00    Lack of Flexibility in Remote Connectivity
0:16    No content-aware DLP Tools
0:27    Lack of Secure Communication Platforms
00:13

This lecture will discuss how data loss can be minimized, if not avoided.

00:55

This lecture will cover the need for DLP.

01:19

This discussion will address the different risks involved in preventing data loss.

00:22

This discussion will center on the common areas where data is usually lost.

00:26

This lecture will identify the difference between DLP and data leakage.

Section 2 - Quiz
6 questions
8 pages

This PDF file contains Section 2 of this course. You can download the complete e book at the end of this course.

Section 3: Data Categories and Lifecylce
00:20

In this lecture, we'll discuss some objectives aimed at showing what you can expect to learn from this course.

.

Section Outline


Lecture 23: Categories in DLP

Lecture 24: Data Lifecycle

Lecture 25: Data in Motion

Lecture 26: Data in Use

Lecture 27: Data at Rest

Lecture 28: Data Breach

Lecture 29: Information Security

Lecture 30: Secuirty Awareness

02:05

This lecture will discuss the different categories in DLP.

.

Lecture outline:

0:00    Introduction to the Categories of DLP
0:17    Standard Security Measures
1:02    Advanced Security Measures
1:25    Designated DLP Solutions
00:21

This lecture will explain the process in data lifecycle.

01:15

This lecture will discuss one of the different categories, namely Data in Motion, involved in the data lifecycle process.

01:15

This lecture will discuss one of the different categories, namely Data in Use, involved in the data lifecycle process.

02:30

This lecture will discuss one of the different categories, namely Data at Rest, involved in the data lifecycle process.

02:07

This discussion will define one of the commonly used terms in DLP: data breach.

01:02

This discussion will define one of the commonly used terms in DLP: information security.

00:45

This discussion will define one of the commonly used terms in DLP: security awareness.

Section 3 - Quiz
6 questions
9 pages

This PDF file contains Section 3 of this course. You can download the complete e book at the end of this course.

Section 4: Computer Security
00:26

In this lecture, we'll discuss some objectives aimed at showing what you can expect to learn from this course.

.

Section Outline


Lecture 33: Introduction to Computer Security

Lecture 34: Secure OS

Lecture 35: Importance of Computer Security

Lecture 36: Computer Security Threats

Lecture 37: Improving Computer Security

02:10

This lecture will introduce security in computers.

05:00

This lecture will explain how the computer OS is important in computer security.

02:19

This lecture will talk about the importance of computer security.

01:37

This lecture will identify the threats that breach the security of our computers.

.

Lecture outline:

0:00    Introduction to Computer Security Threats
0:23    Computer Virus Threats
0:50    Spyware Threats
1:04    Hackers and Predators
1:23    Phishing Threats
06:01

This discussion will focus on the different ways on improving the security on our computers.

.

Lecture outline:

0:00    Connect to a Secure Network
0:50    Enable and Configure a Firewall
1:27    Install and Use Antivirus and Antispyware Software
2:29    Secure Your Web Browser
3:51    Use Good Security Practices
Section 4 - Quiz
6 questions
10 pages

This PDF file contains Section 4 of this course. You can download the complete e book at the end of this course.

Section 5: Cloud Security
00:24

In this lecture, we'll discuss some objectives aimed at showing what you can expect to learn from this course.

.

Section Outline


Lecture 40: Introduction to Cloud Security

Lecture 41: Security Issues

Lecture 42: Security Controls

Lecture 43: Dimensions of Cloud Security

Lecture 44: Key Security Issues

00:29

This lecture will introduce security in the cloud.

01:27

This lecture will explain the security issues involved in the cloud.

04:08

This lecture will identify the different security controls involved in securing the cloud.

.

Lecture outline:

0:00    Introduction to Security Controls
0:35    Detective Controls
0:52    Deterrent Controls
3:03    Preventive Controls
3:47    Corrective Controls
00:27

This lecture will explain the dimensions of cloud security and its three general areas.

10:20

This discussion will address the security issues which are critical in securing the cloud.

.

Lecture outline:

0:00    Introduction to the Key Security Issues
0:41    Internal Clouds are not Inherently Secure
2:45    Companies Lack Security Visibility and Risk Awareness
4:53    Sensitive Information Needs Safer Storage
6:52    Apps aren't Secure
8:49    Authentication and Authorization Must be more Robust
Section 5 - Quiz
6 questions
10 pages

This PDF file contains Section 5 of this course. You can download the complete e book at the end of this course.

Section 6: Data Loss Prevention Solutions
00:22

In this lecture, we'll discuss some objectives aimed at showing what you can expect to learn from this course.

.

Section Outline


Lecture 47: Introduction to DLP Solutions

Lecture 48: DLP Features vs DLP Solutions

Lecture 49: Things to Consider in DLP Solutions

00:42

DLP solutions both protect sensitive data and provide insight into the use of content within the enterprise. This lecture will discuss these solutions.

02:45

This lecture will identify the difference between DLP features and DLP solutions.

14:00

This discussion will focus on some of the things to consider to have an effective DLP.

.

Lecture outline:

0:00    Identify and Prioritize
2:25    Comprehensive Accuracy
5:06    Insist of Pre-built Policies
6:35    Protect More
7:26    Respond to Each Incident
8:52    Optimize Response Process
10:43   Education and Self-Remediation
11:59   Implement an Architecture
Section 6 - Quiz
6 questions
9 pages

This PDF file contains Section 6 of this course. You can download the complete e book at the end of this course.

Section 7: Cyber Secuirty Standards
00:21

In this lecture, we'll discuss some objectives aimed at showing what you can expect to learn from this course.

.

Section Outline


Lecture 52: Introduction to Cloud Security

Lecture 53: Security Issues

Lecture 54: Security Controls

Lecture 55: Dimensions of Cloud Security

Lecture 56: Key Security Issues

Lecture 57: Dimensions of Cloud Security

Lecture 58: Key Security Issues

Lecture 59: Other Standards

00:34

This lecture will introduce the standards involved in cyber security.

01:46

This lecture will discuss the history of cyber security standards.

00:57

This discussion will focus on one of the standards in cyber security, namely the Standard of Good Practice.

02:37

This discussion will focus on one of the standards in cyber security, namely the ISO/IEC 27002.

01:02

This discussion will focus on one of the standards in cyber security, namely the ISO 15408.

00:31

This discussion will focus on one of the standards in cyber security, namely the RFC 2196.

02:19

This discussion will focus on one of the standards in cyber security, namely the IEC/ISA 62443.

07:25

This discussion will focus on the other standards involved in cyber security.

.

Lecture outline:

0:00    ISO/IEC 13335-1:2004
0:27    ISO/IEC TR 15443-1:2005
0:50    ISO/IEC 15816:2002
1:13    ISO/IEC TR 15947:2002
1:50    ISO/IEC 15408-1/2/3:2005
2:49    ISO/IEC 17799:2005
3:21    ISO/IEC TR 15446:2004
3:57    ISO/IEC 18028:2006
4:41    ISO/IEC 27001:2005
5:26    ISO/IEC TR 18044:2004
6:09    ISO/TR 13569:2005
6:38    ISO/IEC 18045:2005
Section 7 - Quiz
6 questions
9 pages

This PDF file contains Section 7 of this course. You can download the complete e book at the end of this course.

Section 8: Course Resources
108 pages

This e book contains the entire Data Loss Prevention course in a PDF format.

3 pages

This e book is a list of terms and definitions often used in the field of Data Loss Prevention.

7 pages

This PDF file contains all the answers to all the quizzes in each section of this course.

Section 9: Data Loss Prevention Certification
1 page

Now that you've finished your Udemy course, - you are eligible to sit your official Certification exam.

Certification is not mandatory.

Once you've completed the course, email our exam department at exams@artofservice.com.au to purchase your exam voucher and sit your final exam.

. Access includes a step-by-step procedure on how to take the final exam and how to obtain your exam certification.

You will receive a PDF certificate through your email upon passing the examination.

1 page

We are always in the process of improving our courses and procedures for a better learning experience for our students. Your input is very important to us.

Follow the step-by-step procedure on taking the evaluation and receiving your certificate of completion.

01:27

A final message from our CEO.

Students Who Viewed This Course Also Viewed

  • Loading
  • Loading
  • Loading

Instructor Biography

The Art Of Service, Quality education for Career Driven IT Professionals

What drives us?

In one word? YOU

You are front, center and behind every decision we make in our business.

  • You are starting out in the IT industry
  • You are serious about your career
  • You need certifications on your resume to get that first interview

For you we created the Foundation level courses as well as the Core Series for IT

  • You are an IT Professional with a proven career
  • You need to stay in touch with changes in the industry
  • You need to continue to show your value to the business to ensure your job is secure
  • You want to find out what else would make your IT career more solid

For you we created the Specialist and Intermediate level courses as well as the Core Series for IT

  • You are implementing Processes and methodologies in your company
  • You are managing a team of people and need to look good
  • You started your own business and are looking for template documents to ‘hit the ground running’
  • You need to present on a subject at the next team meeting and are not quite sure where to start

For you we created the Toolkits as well as the Core Series for IT


Our motto:
Every Career driven IT Professional needs to be able to afford quality IT educational materials to stay relevant in their job, irrespective of current position, budget or geographical location.

We do most of the work behind the scenes so that you can focus on your professional education and your career within the IT industry.

We see it as our job to ensure we give you the most up to date information you need to succeed in achieving that goal at a price-point that is makes it accessible to most professionals.

Ready to start learning?
Take This Course