Data Security
3.3 (4 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
124 students enrolled
Wishlisted Wishlist

Please confirm that you want to add Data Security to your Wishlist.

Add to Wishlist

Data Security

An introductory course about understanding Data Security and the different technologies involved in securing your data.
3.3 (4 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
124 students enrolled
Last updated 3/2015
English
Current price: $10 Original price: $50 Discount: 80% off
1 day left at this price!
30-Day Money-Back Guarantee
Includes:
  • 3 hours on-demand video
  • 1 min on-demand audio
  • 13 Supplemental Resources
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
What Will I Learn?
  • Be introduced to Data Security.
  • Understand the different Data Security technologies.
  • Be informed about Information Security.
  • Be aware of the basic principles of Information Security.
  • Know about Risk Management and the different types of controls.
  • Learn the different ways of backing up data and information.
  • Learn the different software available for protecting and securing data.
  • Be aware of the different companies and organizations that track secure and protected data and information.
  • Be aware of the different certifications to ensure the security and protection of data and information.
View Curriculum
Requirements
  • Basic understanding of the IT industry
  • Knowledge of the English language
Description

Data Security is the means of ensuring that data is kept safe from corruption and that access to it is suitably controlled. Data Security helps to ensure privacy. It also helps to protect personal data.

This course will begin by introducing Data Security and Information Security. Discussions about Risk Management, its principles, methods, and types will be included in the course. Since it is essential to safeguard data, this course will explain the different ways of securing and protecting data on both hardware and software platforms.

Who is the target audience?
  • Individuals and businesses wanting to reduce security risks and avoid potential financial losses.
  • Businesses looking to implement and learn about new data security software.
  • Businesses wanting to protect vital data and information.
Students Who Viewed This Course Also Viewed
Curriculum For This Course
69 Lectures
07:18:21
+
Overview of Data Security
8 Lectures 22:49

In this lecture, we'll discuss some objectives aimed at showing what you can expect to learn from this course.

.

Section Outline

Lecture 2: Data Security

Lecture 3: Internal Laws and Standards

Lecture 4: Data Breach

Lecture 5: Data Remenance

Lecture 6: Data Theft

Lecture 7: Wireless Identity Theft

Preview 00:20

This lecture will explain what data security is all about. It will also describe a few technologies such as disk encryption, authentication, and erasure.

.

Lecture outline:

0:00    Introduction to Data Security
1:01    Disk Encryption
1:54    Mechanisms in Data Security
4:30    Authentication
5:29    Backup Solutions
6:14    Data Masking
6:52    Data Erasure
Preview 08:40

Data security is governed by international laws and standards. This lecture will focus on those laws and standards.

.

Lecture outline:

0:00    Introduction to Data Protection Act
0:32    Trusted Computing Group
International Laws and Standards
00:58

This lecture will discuss terminologies specifically utilized in data breaches.

.

Lecture outline:

0:00    Introduction to Data Breach
2:06    Trusted Environment
2:31    Consequences
Data Breach
03:06

This lecture will discuss what causes data breaches and a few measures to counter those breaches.

.

Lecture outline:

0:00    Introduction to Data Remanence
1:08    Causes of Data Remanence
2:36    Countermeasures to Data Remanence
Data Remanence
05:04

This lecture will discuss terminologies specifically utilized in data theft.

Data Theft
02:21

This lecture will discuss terminologies specifically used in wireless identity theft.

Wireless Identity Theft
02:20

Testing the basics of Data Security

Section 1 - Quiz
5 questions

This PDF file contains Section 1 of this course. You can download the complete e book at the end of this course.

Reading Assignment Section 1
14 pages
+
Information Security
4 Lectures 16:35

In this lecture, we'll discuss some objectives aimed at showing what you can expect to learn from this course.

.

Section Outline

Lecture 10: Information Security

Lecture 11: Terminology

Preview 00:20

This lecture will talk about the definition, history, and basic principles of information security.

.

Lecture outline:

0:00    Introduction to Information Security
0:22    History of Information Security
3:56    Basic Principles of Information Security
5:26    Conclusion
Information Security
06:08

This lecture will discuss a few terminologies related to information security such as asset, compartmentalization, end-point security, and information sensitivity.

.

Lecture outline:

0:00    Asset
1:29    Compartmentalization
2:53    De-perimeterization
4:07    Endpoint Security
4:46    Information Sensitivity
8:02    Intrusion Detection
Terminology
10:07

Testing your knowledge of the terminology

Section 2 - Quiz
5 questions

This PDF file contains Section 2 of this course. You can download the complete e book at the end of this course.

Reading Assignment Section 2
9 pages
+
Managing Risks
6 Lectures 15:07

In this lecture, we'll discuss some objectives aimed at showing what you can expect to learn from this course.

.

Section Outline

Lecture 14: Risk Management

Lecture 15: Types of Controls

Lecture 16: Potential Risk Treatments

Lecture 17: Single Loss Expectancy

Preview 00:24

This discussion will focus on the definition, methods, and principles of risk management.

.

Lecture outline:

0:00    Introduction to Risk Management
1:02    Vulnerability
2:54    Methods Involved in Risk Management
3:21    Principles in Risk Management
Risk Management
04:15

This lecture will identify the three different types of controls in risk management.

.

Lecture outline:

0:00    Introduction to the Types of Controls
0:08    Administrative Controls
1:22    Logical Controls
2:40    Physical Controls
Types of Controls
03:50

This lecture will identify the four major categories of potential risk treatments in risk management.

.

Lecture outline:

0:00    Introduction to the Categories of Potential Risk
0:08    Risk Avoidance
0:46    Risk Reduction
2:48    Risk Sharing
4:43    Risk Retention
Potential Risk Treatments
05:46

This discussion will define and explain single loss expectancy.

Single Loss Expectancy
00:52

Section 3 - Quiz
5 questions

This PDF file contains Section 3 of this course. You can download the complete e book at the end of this course.

Reading Assignment Section 3
8 pages
+
Protecting and Securing Data/Information
11 Lectures 37:58

In this lecture, we'll discuss some objectives aimed at showing what you can expect to learn from this course.

.

Section Outline

Lecture 20: Active Hard Drive Protection

Lecture 21: Air Gap

Lecture 22: Anomaly Detection

Lecture 23: Back Up

Lecture 24: Cloud Service Gateway

Lecture 25: Firewall

Lecture 26: Types of Firewall

Lecture 27: Security of ATM's

Lecture 28: Standard of Good Practice

Preview 00:19

This lecture will discuss one of the many ways of protecting and securing data and information: active hard drive protection.

.

Lecture outline:

0:00    Introduction to Active Hard Drive Protection
0:18    Implementing Active Hard Drive Protection
Active Hard Drive Proctection
01:43

This lecture will discuss one of the many ways of protecting and securing data and information: air gap.

Air Gap
03:20

This lecture will discuss one of the many ways of protecting and securing data and information: anomaly detection.

.

Lecture outline:

0:00    Introduction to Anomaly Detection
0:29    Categories of Anomaly Detection
1:14    Popular Techniques in Anomaly Detection
1:35    Application to Data Security
Anomaly Detection
02:19

This lecture will discuss one of the many ways of protecting and securing data and information: back up.

Back Up
00:33

This lecture will discuss one of the many ways of protecting and securing data and information: cloud service gateway.

.

Lecture outline:

0:00    Introduction to Cloud Storage Gateways
1:47    Backup Target of Cloud Storage Gateways
2:40    Reviews of Cloud Storage Gateways
Cloud Service Gateway
03:05

This lecture will discuss one of the many ways of protecting and securing data and information: firewall.

.

Lecture outline:

0:00    Introduction to Firewall
0:36    History of Firewall
0:54    First Generation Firewalls
3:02    Second Generation Firewalls
5:12    Third Generation of Firewalls
6:19    Subsequent Developments
Firewall
07:51

This lecture will identify the different types of firewall.

.

Lecture outline:

0:00    Introduction to the Types of Firewall
0:12    Network Layer and Packet Filters
2:30    Application Layer
5:14    Proxies
6:03    Network Address Translation
Types of Firewall
06:54

This discussion will focus on securing information at the automated teller machine.

Security of ATM's
08:58

This discussion will center on the Standard of Good Practice.

Standard of Good Practice
02:56

Section 4 - Quiz
5 questions

This PDF file contains Section 4 of this course. You can download the complete e book at the end of this course.

Reading Assignment Section 4
22 pages
+
Back Up
10 Lectures 27:29

In this lecture, we'll discuss some objectives aimed at showing what you can expect to learn from this course.

.

Section Outline

Lecture 31: Back Up

Lecture 32: Repository Models

Lecture 33: Storage Media

Lecture 34: Managing the Data Repository

Lecture 35: Live Data

Lecture 36: Manipulation

Lecture 37: Limitations

Lecture 38: Confusion and Advise

Preview 00:16

This lecture will cover the definition and purpose of backing up data.

Back Up
02:51

This lecture will discuss one of the many ways of backing up your data and information specifically repository models.

.

Lecture outline:

0:00    Introduction to Repository Models
0:34    Unstructured
0:56    System Imaging
1:27    Incremental
3:17    Reverse Delta
Repository Models
04:05

This lecture will identify the different storage media available to back up and store data.

.

Lecture outline:

0:00    Introduction to Storage Media
0:08    Magnetic Tape
0:53    Hard Disk
2:00    Optical Storage
2:49    Floppy Disk
3:09    Solid State Storage
3:32    Remote Backup Service
Storage Media
04:59

This lecture will discuss the management of the data repository.

.

Lecture outline:

0:00    Introduction to Managing the Data Repository
0:28    Online
1:01    Near-line
1:33    Offline
2:11    Offsite Data Protection
2:48    Backup site
Managing the Data Repository
03:35

This lecture will discuss backing up data currently being used.

.

Lecture outline:

0:00    Introduction to Live Data
0:44    Snapshot Backup
1:23    Open File Backup
2:47    Cold database backup
3:05    Hot database backup
Live Data
03:31

This lecture will talk about manipulating the data being backed up.

.

Lecture outline:

0:00    Introduction to Data Manipulation When Backing up
0:21    Compression
0:35    De-duplication
1:45    Duplication
2:03    Encryption
2:33    Multiplexing
2:47    Refactoring
3:23    Staging
Manipulation
03:56

This lecture will identify some limitations of backing up your data.

Limitations
01:43

This discussion will deal with confusion surrounding backing up data and some useful advice on how to back up data successfully.

.

Lecture outline:

0:00    Confusion When Backing up Your Data
0:38    Advise When Backing Up Data
Confusion and Advise
02:33

Section 5 - Quiz
5 questions

This PDF file contains Section 5 of this course. You can download the complete e book at the end of this course.

Reading Assignment Section 5
15 pages
+
Protecting and Securing Information Through Software
8 Lectures 14:51

In this lecture, we'll discuss some objectives aimed at showing what you can expect to learn from this course.

.

Section Outline

Lecture 41: BC Wipe

Lecture 42: Data Shredder and Database Monitoring

Lecture 43: DBAN

Lecture 44: Disk Utility

Lecture 45: HD Erase and MyDLP

Lecture 46: Shred

Preview 00:26

This lecture will cover one of the many software programs available for securing data specifically BC Wipe.

BC Wipe
01:33

This lecture will cover a few of the many software programs available for securing data specifically Data Shredder and Database Monitoring.

.

Lecture outline:

0:00    Introduction to Data Shredder
0:19    Introduction to Data Activity Monitoring
1:41    Core Features of Data Activity Monitoring
Data Shredder and Database Monitoring
03:08

This lecture will cover one of the many software programs available for securing data specifically DBAN.

DBAN
01:34

This lecture will cover one of the many software programs available for securing data specifically Disk Utility.

.

Lecture outline:

0:00    Introduction to Disk Utility
1:35    Functions of Disk Utility
Disk Utility
03:17

This lecture will cover two of the software programs available for securing data specifically HD Erase and MyDLP.

.

Lecture outline:

0:00    Introduction to HDDerase
0:54    Introduction to MyDLP
1:21    Platforms and Interfaces of MyDLP
1:59    Features of MyDLP
DHDerase and MyDLP
02:34

This lecture will cover one of the software programs available for securing data specifically Shred.

.

Lecture outline:

0:00    Introduction to Shred
0:16    Background of Shred
0:56    Features of Shred
1:45    Limitations of Shred
Shred
02:19

Section 6 - Quiz
5 questions

This PDF file contains Section 6 of this course. You can download the complete e book at the end of this course.

Reading Assignment Section 6
10 pages
+
Companies and Organizations
9 Lectures 22:25

In this lecture, we'll discuss some objectives aimed at showing what you can expect to learn from this course.

.

Section Outline

Lecture 49: Blancco

Lecture 50: FAST

Lecture 51: ISF

Lecture 52: ISSA

Lecture 53: Jericho Forum

Lecture 54: LogLogic and NISP

Lecture 55: Secure Network and Splunk

Preview 00:37

This lecture will discuss Blancco, one of the many different companies and organizations that pursue a secure and protected data environment.

.

Lecture outline:

0:00    Introduction to Blancco
0:28    History of Blancco
2:53    Products of Blancco
3:12    Awards of Blancco
Blancco
03:50

This lecture will discuss The Federation Against Software Theft (FAST), one of the many different companies and organizations that pursue a secure and protected data environment.

.

Lecture outline:

0:00    Introduction to FAST
1:12    History of FAST
FAST
03:11

This lecture will talk about The Information Security Forum (ISF), one of the many different companies and organizations that pursue a secure and protected data environment.

.

Lecture outline:

0:00    Introduction to ISF
1:38    Primary Deliverables of ISF
2:12    Revision of the Standard of Good Practice
ISF
02:46

This lecture will discuss The Information Systems Security Association (ISSA) one of the many different companies and organizations that pursue a secure and protected data environment.

.

Lecture outline:

0:00    Introduction to ISSA
0:23    Goal of ISSA
0:47    Activities in ISSA
2:02    Code of Ethics in ISSA
ISSA
03:06

This lecture will discuss Jericho Forum, one of the many different companies and organizations that pursue a secure and protected data environment.

Jericho Forum
02:22

This lecture will discuss LogLogic and NISP, two of the many different companies and organizations that pursue a secure and protected data environment.

.

Lecture outline:

0:00    Introduction to LogLogic
0:38    History of LogLogic
1:09    Products of LogLogic
1:54    Introduction to NISP
2:49    Data Sanitization in NISP
LogLogic and NISP
03:54

This lecture will talk about Secure Network and Splunk, two of the many different companies and organizations that pursue a secure and protected data environment.

.

Lecture outline:

0:00    Introduction to Secure Network
0:32    Introduction to Splunk
2:04    Products of Splunk
Secure Network and Splunk
02:39

Section 7 - Quiz
5 questions

This PDF file contains Section 7 of this course. You can download the complete e book at the end of this course.

Reading Assignment Section 7
13 pages
+
Certifications for Data Security
7 Lectures 18:40

In this lecture, we'll discuss some objectives aimed at showing what you can expect to learn from this course.

.

Section Outline

Lecture 58: CISSP

Lecture 59: CISM

Lecture 60: CISA

Lecture 61: Holistic Information Security Practitioner

Lecture 62: Q/ISP


Preview 00:38

This discussion will focus on the Certified Information Systems Security Professional (CISSP), which is one of the different certification bodies that ensure security and protection of data.

.

Lecture outline:

0:00    Introduction to CISSP
1:10    History of CISSP
1:46    Ongoing Certification of CISSP
3:02    Specialized Concentrations of CISSP
4:30    Promotion in CISSP
CISSP
06:11

This discussion will focus on the Certified Information Security Manager (CISM), which is one of the different certification bodies that ensure security and protection of data.

.

Lecture outline:

0:00    Introduction to CISM
2:04    Knowledge Domains of CISM
CISM
02:27

This discussion will focus on the Certified Information Systems Auditor (CISA), which is one of the different certification bodies that ensure security and protection of data.

.

Lecture outline:

0:00    Introduction to CISA
0:21    History of CISA
1:54    Requirements of CISA
3:23    Examination in CISA
CISA
04:46

This discussion will focus on the Holistic Info Security Practitioner, which is one of the different certification bodies that ensure security and protection of data.

Holistic Information Security Practitioner
00:45

This discussion will focus on the Qualified / Information Security Professional (Q/ISP), which is one of the different certification bodies that ensure security and protection of data.

.

Lecture outline:

0:00    Introduction to Q/ISP
0:43    History of Q/ISP
1:14    Requirements of Q/ISP
2:18    Ongoing Certification of Q/ISP
Q/ISP
03:53

Section 8 - Quiz
5 questions

This PDF file contains Section 8 of this course. You can download the complete e book at the end of this course.

Reading Assignment Section 8
10 pages
+
Course Resources
3 Lectures 00:00

This e book contains the entire Data Security course in a PDF format.

Data Security Complete Certification Kit Book
150 pages

This e book is a list of terms and definitions often used in the field of Data Security.

Data Security Glossary of Terms
4 pages

This PDF file contains all the answers to all the quizzes in each section of this course.

Quiz Answer Sheet
4 pages
+
Data Security Certification
3 Lectures 01:27

Now that you've finished your Udemy course, - you are eligible to sit your official Certification exam.

Certification is not mandatory.

Once you've completed the course, email our exam department at exams@artofservice.com.au to purchase your exam voucher and sit your final exam.

. Access includes a step-by-step procedure on how to take the final exam and how to obtain your exam certification.

You will receive a PDF certificate through your email upon passing the examination.


Final Exam
1 page

We are always in the process of improving our courses and procedures for a better learning experience for our students. Your input is very important to us.

Follow the step-by-step procedure on taking the evaluation and receiving your certificate of completion.

Evaluation Form
1 page

A final message from our CEO.

Conclusion - Final Lecture
01:27
About the Instructor
The Art Of Service
3.5 Average rating
439 Reviews
5,073 Students
57 Courses
Quality education for Career Driven IT Professionals

What drives us?

In one word? YOU

You are front, center and behind every decision we make in our business.

  • You are starting out in the IT industry
  • You are serious about your career
  • You need certifications on your resume to get that first interview

For you we created the Foundation level courses as well as the Core Series for IT

  • You are an IT Professional with a proven career
  • You need to stay in touch with changes in the industry
  • You need to continue to show your value to the business to ensure your job is secure
  • You want to find out what else would make your IT career more solid

For you we created the Specialist and Intermediate level courses as well as the Core Series for IT

  • You are implementing Processes and methodologies in your company
  • You are managing a team of people and need to look good
  • You started your own business and are looking for template documents to ‘hit the ground running’
  • You need to present on a subject at the next team meeting and are not quite sure where to start

For you we created the Toolkits as well as the Core Series for IT


Our motto:
Every Career driven IT Professional needs to be able to afford quality IT educational materials to stay relevant in their job, irrespective of current position, budget or geographical location.

We do most of the work behind the scenes so that you can focus on your professional education and your career within the IT industry.

We see it as our job to ensure we give you the most up to date information you need to succeed in achieving that goal at a price-point that is makes it accessible to most professionals.