Data Security

An introductory course about understanding Data Security and the different technologies involved in securing your data.
3.0 (2 ratings)
Instead of using a simple lifetime average, Udemy calculates a
course's star rating by considering a number of different factors
such as the number of ratings, the age of ratings, and the
likelihood of fraudulent ratings.
104 students enrolled
$19
$50
62% off
Take This Course
  • Lectures 69
  • Length 7.5 hours
  • Skill Level All Levels
  • Languages English
  • Includes Lifetime access
    30 day money back guarantee!
    Available on iOS and Android
    Certificate of Completion
Wishlisted Wishlist

How taking a course works

Discover

Find online courses made by experts from around the world.

Learn

Take your courses with you and learn anywhere, anytime.

Master

Learn and practice real-world skills and achieve your goals.

About This Course

Published 1/2014 English

Course Description

Data Security is the means of ensuring that data is kept safe from corruption and that access to it is suitably controlled. Data Security helps to ensure privacy. It also helps to protect personal data.

This course will begin by introducing Data Security and Information Security. Discussions about Risk Management, its principles, methods, and types will be included in the course. Since it is essential to safeguard data, this course will explain the different ways of securing and protecting data on both hardware and software platforms.

What are the requirements?

  • Basic understanding of the IT industry
  • Knowledge of the English language

What am I going to get from this course?

  • Be introduced to Data Security.
  • Understand the different Data Security technologies.
  • Be informed about Information Security.
  • Be aware of the basic principles of Information Security.
  • Know about Risk Management and the different types of controls.
  • Learn the different ways of backing up data and information.
  • Learn the different software available for protecting and securing data.
  • Be aware of the different companies and organizations that track secure and protected data and information.
  • Be aware of the different certifications to ensure the security and protection of data and information.

What is the target audience?

  • Individuals and businesses wanting to reduce security risks and avoid potential financial losses.
  • Businesses looking to implement and learn about new data security software.
  • Businesses wanting to protect vital data and information.

What you get with this course?

Not for you? No problem.
30 day money back guarantee.

Forever yours.
Lifetime access.

Learn on the go.
Desktop, iOS and Android.

Get rewarded.
Certificate of completion.

Curriculum

Section 1: Overview of Data Security
00:20

In this lecture, we'll discuss some objectives aimed at showing what you can expect to learn from this course.

.

Section Outline

Lecture 2: Data Security

Lecture 3: Internal Laws and Standards

Lecture 4: Data Breach

Lecture 5: Data Remenance

Lecture 6: Data Theft

Lecture 7: Wireless Identity Theft

08:40

This lecture will explain what data security is all about. It will also describe a few technologies such as disk encryption, authentication, and erasure.

.

Lecture outline:

0:00    Introduction to Data Security
1:01    Disk Encryption
1:54    Mechanisms in Data Security
4:30    Authentication
5:29    Backup Solutions
6:14    Data Masking
6:52    Data Erasure
00:58

Data security is governed by international laws and standards. This lecture will focus on those laws and standards.

.

Lecture outline:

0:00    Introduction to Data Protection Act
0:32    Trusted Computing Group
03:06

This lecture will discuss terminologies specifically utilized in data breaches.

.

Lecture outline:

0:00    Introduction to Data Breach
2:06    Trusted Environment
2:31    Consequences
05:04

This lecture will discuss what causes data breaches and a few measures to counter those breaches.

.

Lecture outline:

0:00    Introduction to Data Remanence
1:08    Causes of Data Remanence
2:36    Countermeasures to Data Remanence
02:21

This lecture will discuss terminologies specifically utilized in data theft.

02:20

This lecture will discuss terminologies specifically used in wireless identity theft.

5 questions

Testing the basics of Data Security

14 pages

This PDF file contains Section 1 of this course. You can download the complete e book at the end of this course.

Section 2: Information Security
00:20

In this lecture, we'll discuss some objectives aimed at showing what you can expect to learn from this course.

.

Section Outline

Lecture 10: Information Security

Lecture 11: Terminology

06:08

This lecture will talk about the definition, history, and basic principles of information security.

.

Lecture outline:

0:00    Introduction to Information Security
0:22    History of Information Security
3:56    Basic Principles of Information Security
5:26    Conclusion
10:07

This lecture will discuss a few terminologies related to information security such as asset, compartmentalization, end-point security, and information sensitivity.

.

Lecture outline:

0:00    Asset
1:29    Compartmentalization
2:53    De-perimeterization
4:07    Endpoint Security
4:46    Information Sensitivity
8:02    Intrusion Detection
5 questions

Testing your knowledge of the terminology

9 pages

This PDF file contains Section 2 of this course. You can download the complete e book at the end of this course.

Section 3: Managing Risks
00:24

In this lecture, we'll discuss some objectives aimed at showing what you can expect to learn from this course.

.

Section Outline

Lecture 14: Risk Management

Lecture 15: Types of Controls

Lecture 16: Potential Risk Treatments

Lecture 17: Single Loss Expectancy

04:15

This discussion will focus on the definition, methods, and principles of risk management.

.

Lecture outline:

0:00    Introduction to Risk Management
1:02    Vulnerability
2:54    Methods Involved in Risk Management
3:21    Principles in Risk Management
03:50

This lecture will identify the three different types of controls in risk management.

.

Lecture outline:

0:00    Introduction to the Types of Controls
0:08    Administrative Controls
1:22    Logical Controls
2:40    Physical Controls
05:46

This lecture will identify the four major categories of potential risk treatments in risk management.

.

Lecture outline:

0:00    Introduction to the Categories of Potential Risk
0:08    Risk Avoidance
0:46    Risk Reduction
2:48    Risk Sharing
4:43    Risk Retention
00:52

This discussion will define and explain single loss expectancy.

Section 3 - Quiz
5 questions
8 pages

This PDF file contains Section 3 of this course. You can download the complete e book at the end of this course.

Section 4: Protecting and Securing Data/Information
00:19

In this lecture, we'll discuss some objectives aimed at showing what you can expect to learn from this course.

.

Section Outline

Lecture 20: Active Hard Drive Protection

Lecture 21: Air Gap

Lecture 22: Anomaly Detection

Lecture 23: Back Up

Lecture 24: Cloud Service Gateway

Lecture 25: Firewall

Lecture 26: Types of Firewall

Lecture 27: Security of ATM's

Lecture 28: Standard of Good Practice

01:43

This lecture will discuss one of the many ways of protecting and securing data and information: active hard drive protection.

.

Lecture outline:

0:00    Introduction to Active Hard Drive Protection
0:18    Implementing Active Hard Drive Protection
03:20

This lecture will discuss one of the many ways of protecting and securing data and information: air gap.

02:19

This lecture will discuss one of the many ways of protecting and securing data and information: anomaly detection.

.

Lecture outline:

0:00    Introduction to Anomaly Detection
0:29    Categories of Anomaly Detection
1:14    Popular Techniques in Anomaly Detection
1:35    Application to Data Security
00:33

This lecture will discuss one of the many ways of protecting and securing data and information: back up.

03:05

This lecture will discuss one of the many ways of protecting and securing data and information: cloud service gateway.

.

Lecture outline:

0:00    Introduction to Cloud Storage Gateways
1:47    Backup Target of Cloud Storage Gateways
2:40    Reviews of Cloud Storage Gateways
07:51

This lecture will discuss one of the many ways of protecting and securing data and information: firewall.

.

Lecture outline:

0:00    Introduction to Firewall
0:36    History of Firewall
0:54    First Generation Firewalls
3:02    Second Generation Firewalls
5:12    Third Generation of Firewalls
6:19    Subsequent Developments
06:54

This lecture will identify the different types of firewall.

.

Lecture outline:

0:00    Introduction to the Types of Firewall
0:12    Network Layer and Packet Filters
2:30    Application Layer
5:14    Proxies
6:03    Network Address Translation
08:58

This discussion will focus on securing information at the automated teller machine.

02:56

This discussion will center on the Standard of Good Practice.

Section 4 - Quiz
5 questions
22 pages

This PDF file contains Section 4 of this course. You can download the complete e book at the end of this course.

Section 5: Back Up
00:16

In this lecture, we'll discuss some objectives aimed at showing what you can expect to learn from this course.

.

Section Outline

Lecture 31: Back Up

Lecture 32: Repository Models

Lecture 33: Storage Media

Lecture 34: Managing the Data Repository

Lecture 35: Live Data

Lecture 36: Manipulation

Lecture 37: Limitations

Lecture 38: Confusion and Advise

02:51

This lecture will cover the definition and purpose of backing up data.

04:05

This lecture will discuss one of the many ways of backing up your data and information specifically repository models.

.

Lecture outline:

0:00    Introduction to Repository Models
0:34    Unstructured
0:56    System Imaging
1:27    Incremental
3:17    Reverse Delta
04:59

This lecture will identify the different storage media available to back up and store data.

.

Lecture outline:

0:00    Introduction to Storage Media
0:08    Magnetic Tape
0:53    Hard Disk
2:00    Optical Storage
2:49    Floppy Disk
3:09    Solid State Storage
3:32    Remote Backup Service
03:35

This lecture will discuss the management of the data repository.

.

Lecture outline:

0:00    Introduction to Managing the Data Repository
0:28    Online
1:01    Near-line
1:33    Offline
2:11    Offsite Data Protection
2:48    Backup site
03:31

This lecture will discuss backing up data currently being used.

.

Lecture outline:

0:00    Introduction to Live Data
0:44    Snapshot Backup
1:23    Open File Backup
2:47    Cold database backup
3:05    Hot database backup
03:56

This lecture will talk about manipulating the data being backed up.

.

Lecture outline:

0:00    Introduction to Data Manipulation When Backing up
0:21    Compression
0:35    De-duplication
1:45    Duplication
2:03    Encryption
2:33    Multiplexing
2:47    Refactoring
3:23    Staging
01:43

This lecture will identify some limitations of backing up your data.

02:33

This discussion will deal with confusion surrounding backing up data and some useful advice on how to back up data successfully.

.

Lecture outline:

0:00    Confusion When Backing up Your Data
0:38    Advise When Backing Up Data
Section 5 - Quiz
5 questions
15 pages

This PDF file contains Section 5 of this course. You can download the complete e book at the end of this course.

Section 6: Protecting and Securing Information Through Software
00:26

In this lecture, we'll discuss some objectives aimed at showing what you can expect to learn from this course.

.

Section Outline

Lecture 41: BC Wipe

Lecture 42: Data Shredder and Database Monitoring

Lecture 43: DBAN

Lecture 44: Disk Utility

Lecture 45: HD Erase and MyDLP

Lecture 46: Shred

01:33

This lecture will cover one of the many software programs available for securing data specifically BC Wipe.

03:08

This lecture will cover a few of the many software programs available for securing data specifically Data Shredder and Database Monitoring.

.

Lecture outline:

0:00    Introduction to Data Shredder
0:19    Introduction to Data Activity Monitoring
1:41    Core Features of Data Activity Monitoring
01:34

This lecture will cover one of the many software programs available for securing data specifically DBAN.

03:17

This lecture will cover one of the many software programs available for securing data specifically Disk Utility.

.

Lecture outline:

0:00    Introduction to Disk Utility
1:35    Functions of Disk Utility
02:34

This lecture will cover two of the software programs available for securing data specifically HD Erase and MyDLP.

.

Lecture outline:

0:00    Introduction to HDDerase
0:54    Introduction to MyDLP
1:21    Platforms and Interfaces of MyDLP
1:59    Features of MyDLP
02:19

This lecture will cover one of the software programs available for securing data specifically Shred.

.

Lecture outline:

0:00    Introduction to Shred
0:16    Background of Shred
0:56    Features of Shred
1:45    Limitations of Shred
Section 6 - Quiz
5 questions
10 pages

This PDF file contains Section 6 of this course. You can download the complete e book at the end of this course.

Section 7: Companies and Organizations
00:37

In this lecture, we'll discuss some objectives aimed at showing what you can expect to learn from this course.

.

Section Outline

Lecture 49: Blancco

Lecture 50: FAST

Lecture 51: ISF

Lecture 52: ISSA

Lecture 53: Jericho Forum

Lecture 54: LogLogic and NISP

Lecture 55: Secure Network and Splunk

03:50

This lecture will discuss Blancco, one of the many different companies and organizations that pursue a secure and protected data environment.

.

Lecture outline:

0:00    Introduction to Blancco
0:28    History of Blancco
2:53    Products of Blancco
3:12    Awards of Blancco
03:11

This lecture will discuss The Federation Against Software Theft (FAST), one of the many different companies and organizations that pursue a secure and protected data environment.

.

Lecture outline:

0:00    Introduction to FAST
1:12    History of FAST
02:46

This lecture will talk about The Information Security Forum (ISF), one of the many different companies and organizations that pursue a secure and protected data environment.

.

Lecture outline:

0:00    Introduction to ISF
1:38    Primary Deliverables of ISF
2:12    Revision of the Standard of Good Practice
03:06

This lecture will discuss The Information Systems Security Association (ISSA) one of the many different companies and organizations that pursue a secure and protected data environment.

.

Lecture outline:

0:00    Introduction to ISSA
0:23    Goal of ISSA
0:47    Activities in ISSA
2:02    Code of Ethics in ISSA
02:22

This lecture will discuss Jericho Forum, one of the many different companies and organizations that pursue a secure and protected data environment.

03:54

This lecture will discuss LogLogic and NISP, two of the many different companies and organizations that pursue a secure and protected data environment.

.

Lecture outline:

0:00    Introduction to LogLogic
0:38    History of LogLogic
1:09    Products of LogLogic
1:54    Introduction to NISP
2:49    Data Sanitization in NISP
02:39

This lecture will talk about Secure Network and Splunk, two of the many different companies and organizations that pursue a secure and protected data environment.

.

Lecture outline:

0:00    Introduction to Secure Network
0:32    Introduction to Splunk
2:04    Products of Splunk
Section 7 - Quiz
5 questions
13 pages

This PDF file contains Section 7 of this course. You can download the complete e book at the end of this course.

Section 8: Certifications for Data Security
00:38

In this lecture, we'll discuss some objectives aimed at showing what you can expect to learn from this course.

.

Section Outline

Lecture 58: CISSP

Lecture 59: CISM

Lecture 60: CISA

Lecture 61: Holistic Information Security Practitioner

Lecture 62: Q/ISP


06:11

This discussion will focus on the Certified Information Systems Security Professional (CISSP), which is one of the different certification bodies that ensure security and protection of data.

.

Lecture outline:

0:00    Introduction to CISSP
1:10    History of CISSP
1:46    Ongoing Certification of CISSP
3:02    Specialized Concentrations of CISSP
4:30    Promotion in CISSP
02:27

This discussion will focus on the Certified Information Security Manager (CISM), which is one of the different certification bodies that ensure security and protection of data.

.

Lecture outline:

0:00    Introduction to CISM
2:04    Knowledge Domains of CISM
04:46

This discussion will focus on the Certified Information Systems Auditor (CISA), which is one of the different certification bodies that ensure security and protection of data.

.

Lecture outline:

0:00    Introduction to CISA
0:21    History of CISA
1:54    Requirements of CISA
3:23    Examination in CISA
00:45

This discussion will focus on the Holistic Info Security Practitioner, which is one of the different certification bodies that ensure security and protection of data.

03:53

This discussion will focus on the Qualified / Information Security Professional (Q/ISP), which is one of the different certification bodies that ensure security and protection of data.

.

Lecture outline:

0:00    Introduction to Q/ISP
0:43    History of Q/ISP
1:14    Requirements of Q/ISP
2:18    Ongoing Certification of Q/ISP
Section 8 - Quiz
5 questions
10 pages

This PDF file contains Section 8 of this course. You can download the complete e book at the end of this course.

Section 9: Course Resources
150 pages

This e book contains the entire Data Security course in a PDF format.

4 pages

This e book is a list of terms and definitions often used in the field of Data Security.

4 pages

This PDF file contains all the answers to all the quizzes in each section of this course.

Section 10: Data Security Certification
1 page

Now that you've finished your Udemy course, - you are eligible to sit your official Certification exam.

Certification is not mandatory.

Once you've completed the course, email our exam department at exams@artofservice.com.au to purchase your exam voucher and sit your final exam.

. Access includes a step-by-step procedure on how to take the final exam and how to obtain your exam certification.

You will receive a PDF certificate through your email upon passing the examination.


1 page

We are always in the process of improving our courses and procedures for a better learning experience for our students. Your input is very important to us.

Follow the step-by-step procedure on taking the evaluation and receiving your certificate of completion.

01:27

A final message from our CEO.

Students Who Viewed This Course Also Viewed

  • Loading
  • Loading
  • Loading

Instructor Biography

The Art Of Service, Quality education for Career Driven IT Professionals

What drives us?

In one word? YOU

You are front, center and behind every decision we make in our business.

  • You are starting out in the IT industry
  • You are serious about your career
  • You need certifications on your resume to get that first interview

For you we created the Foundation level courses as well as the Core Series for IT

  • You are an IT Professional with a proven career
  • You need to stay in touch with changes in the industry
  • You need to continue to show your value to the business to ensure your job is secure
  • You want to find out what else would make your IT career more solid

For you we created the Specialist and Intermediate level courses as well as the Core Series for IT

  • You are implementing Processes and methodologies in your company
  • You are managing a team of people and need to look good
  • You started your own business and are looking for template documents to ‘hit the ground running’
  • You need to present on a subject at the next team meeting and are not quite sure where to start

For you we created the Toolkits as well as the Core Series for IT


Our motto:
Every Career driven IT Professional needs to be able to afford quality IT educational materials to stay relevant in their job, irrespective of current position, budget or geographical location.

We do most of the work behind the scenes so that you can focus on your professional education and your career within the IT industry.

We see it as our job to ensure we give you the most up to date information you need to succeed in achieving that goal at a price-point that is makes it accessible to most professionals.

Ready to start learning?
Take This Course