Data Wiping and Destruction
2.9 (4 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
80 students enrolled
Wishlisted Wishlist

Please confirm that you want to add Data Wiping and Destruction to your Wishlist.

Add to Wishlist

Data Wiping and Destruction

An introductory course about understanding data wiping and destruction, data erasure and data sanitization.
2.9 (4 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
80 students enrolled
Last updated 3/2015
English
Current price: $10 Original price: $50 Discount: 80% off
1 day left at this price!
30-Day Money-Back Guarantee
Includes:
  • 2.5 hours on-demand video
  • 1 min on-demand audio
  • 12 Supplemental Resources
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
What Will I Learn?
  • Have a working knowledge of data remanence, data wiping and data destruction.
  • Be aware of the cause of data remenance.
  • Know that file deletion is not the best way to permanently delete files.
  • Take action in protecting their media and responsively removed sensitive data.
View Curriculum
Requirements
  • Basic understanding of the IT industry
  • Knowledge of the English language
Description

This introductory course will discuss the cause, problems and countermeasures for data remanence. Aside from that terms like deletion and undeletion will be incorporated in the course. The different methods and each advantage and disadvantage of data wiping and data destruction will also be discussed.

Who is the target audience?
  • Recent graduates looking to get a foothold in the IT Industry.
  • Data Analysts looking to delete, protect, or restore business data and information.
  • Business owners wanting to learn more about data destruction and wiping techniques.
  • Managers looking for an effective way of maintaining data security measures.
Students Who Viewed This Course Also Viewed
Curriculum For This Course
Expand All 80 Lectures Collapse All 80 Lectures 06:05:20
+
Overview of Data Security and Information Sensitivity
11 Lectures 19:43

In this lecture, we'll discuss some objectives aimed at showing what you can expect to learn from this course.

Section Outline

Lecture 2: Introduction to Data Security

Lecture 3: Information Security

Lecture 4: Information Sensitivity

Lecture 5: Non-Sensitive Information

Lecture 6: Types of Sensitive Information

Lecture 7: Identity Theft

Lecture 8: Data Leaks

Lecture 9: File Deletion

Lecture 10: Undeletion

Preview 00:35

This lecture will introduce and define data security.

Preview 01:09

This lecture will discuss information security.

.

Lecture outline:

0:00    Information Security
0:40    Introduction to the CIA Triad
0:51    Confidentiality
1:58    Integrity
3:31    Availability
Preview 04:35

This lecture will explain the sensitivity of information.

Preview 02:10

This lecture will explain the non-sensitivity of information.

Non-Sensitive Information
00:54

This lecture will identify the different types of sensitive information.

.

Lecture outline:

0:00    Introduction to Different Types
	of Sensitive Information
0:11    Personal and Private Information
1:57    Confidential Business Information
2:17    Classified Information
Types of Sensitive Information
03:02

This discussion will focus on identity theft.

Identity Theft
01:02

This lecture will explain data leaks.

Data Leaks
01:19

This lecture will discuss file deletion.

.

Lecture outline:

0:00    Introduction to File Deletion
0:30    Problem with Accidental Deletion
1:49    Problem with Sensitive Data
File Deletion
02:36

This lecture will talk about the undeletion of data.

.

Lecture outline:

0:00    Introduction to Undeletion of Data
0:36    Support
1:45    Limitations
2:12    Prevention
Undeletion
02:21

Section 1 - Quiz
6 questions

This PDF file contains Section 1 of this course. You can download the complete e book at the end of this course.

Reading Assignment Section 1
11 pages
+
Data Erasure
11 Lectures 19:23

In this lecture, we'll discuss some objectives aimed at showing what you can expect to learn from this course.

Section Outline

Lecture 13: Introduction to Data Erasure

Lecture 14: Where is Data Located?

Lecture 15: Understanding File Deletion

Lecture 16: Importance of Data Erasure

Lecture 17: Reasons for Data Erasure

Lecture 18: Data Wiping vs Erasing

Lecture 19: Limitations of Erasing

Lecture 20: Benefits of Data Erasure

Lecture 21: Data Breach

Preview 00:27

This lecture will cover erasure of data.

Introduction to Data Erasure
03:16

This lecture will talk about where data is located.

Where is Data Located?
01:02

This lecture will talk about understanding file deletion.

.

Lecture outline:

0:00    Understanding File Deletion
2:49    What are the Risks?
3:42    Can you Erase Files by Formatting?
Understanding File Deletion
03:59

This lecture will discuss the importance of data erasure.

Importance of Data Erasure
03:44

This lecture will identify some reasons for data erasure.

Reasons for Data Erasure
02:01

This lecture will identify the difference between data wiping and data erasing.

Data Wiping vs Erasing
00:30

This lecture will identify some limitations of erasing.

Limitations of Erasing
00:29

This lecture will identify the benefits of data erasure.

Benefits of Data Erasure
01:03

This lecture will explain data breach.

Data Breach
02:52

Section 2 - Quiz
6 questions

This PDF file contains Section 2 of this course. You can download the complete e book at the end of this course.

Reading Assignment Section 2
12 pages
+
Data Sanitization
8 Lectures 13:18

In this lecture, we'll discuss some objectives aimed at showing what you can expect to learn from this course.

Section Outline

Lecture 24: Introduction to Data Sanitization

Lecture 25: Data Sanitization Methods

Lecture 26: Best Method

Lecture 27: What Files are Erased, Benefits and Features

Lecture 28: Self Destruct

Lecture 29: Remote Data Deletion

Preview 00:30

This lecture will introduce and define data sanitization.

Introduction to Data Sanitization
03:43

This lecture will identify methods of data sanitization.

Data Sanitization Methods
00:57

This lecture will discuss the best method in data sanitization.

Best Method
00:32

This lecture will talk about what files should be erased and some benefits and features of data sanitization.

What Files are Erased, Benefits and Features
00:55

This lecture will explain self-destruct.

Self Destruct
00:51

This lecture will explain deletion of remote data.

.

Lecture outline:

0:00    Introduction to the Deletion of Remote Data
1:12    Laptops
1:37    Mobile Phones
3:09    Apple iPhone
3:51    Google Android
4:28    Microsoft Windows Phone
5:11    RIM BlackBerry OS
Remote Data Deletion
05:50

Section 3 - Quiz
6 questions

This PDF file contains Section 3 of this course. You can download the complete e book at the end of this course.

Reading Assignment Section 3
9 pages
+
Data Sanitization Methods
18 Lectures 20:28

In this lecture, we'll discuss some objectives aimed at showing what you can expect to learn from this course.

Section Outline

Lecture 32: Introduction to Data Sanitization

Lecture 33: Secure Erase

Lecture 34: DoD 5220.22-M data sanitization method

Lecture 35: NCSC-TG-025 sanitization method

Lecture 36: AFSSI-5020 sanitization method

Lecture 37: AR 380-19 sanitization method

Lecture 38: NAVSO P-5239-26 sanitization method

Lecture 39: RCMP TSSIT OPS-II data sanitization method

Lecture 40: CSEC ITSG-06 sanitization method

Lecture 41: HMG IS5 sanitization method

Lecture 42: ISM 6.2.92 and NZSIT 402

Lecture 43: Verschlusssache IT Richtlinien

Lecture 44: GOST R 50739-95 method

Lecture 45: Gutmann, Schneier and Pfitzner methods

Lecture 46: Random Data Sanitization method

Lecture 47: Write Zero method

Preview 00:30

This lecture will discuss and identify the different methods of data sanitization.

Introduction to Data Sanitization Method
00:30

This discussion will focus on one method of data sanitization, namely secure erase.

Secure Erase
01:23

This discussion will focus on one method of data sanitization, namely DoD 5220.22-M.

DoD 5220.22-M data sanitization method
01:47

This discussion will focus on one method of data sanitization, namely NCSC-TG-025.

NCSC-TG-025 sanitization method
00:50

This discussion will focus on one method of data sanitization, namely AFSSI-5020.

AFSSI-5020 sanitization method
01:13

This discussion will focus on one method of data sanitization, namely AR 380-19.

AR 380-19 sanitization method
01:09

This discussion will focus on one method of data sanitization, namely NAVSO P-5239-26.

NAVSO P-5239-26 sanitization method
01:00

This discussion will focus on one method of data sanitization, namely RCMP TSSIT OPS-II.

RCMP TSSIT OPS-II data sanitization method
01:35

This discussion will focus on one method of data sanitization, namely CSEC ITSG-06.

CSEC ITSG-06 sanitization method
01:00

This discussion will focus on one method of data sanitization, namely HMG IS5.

HMG IS5 sanitization method
00:53

This discussion will focus on some methods of data sanitization, namely ISM 6.2.92 and NZSIT 402.

ISM 6.2.92 and NZSIT 402
01:45

This discussion will focus on one method of data sanitization, namely Verschlusssache IT Richtlinien.

Verschlusssache IT Richtlinien
01:40

This discussion will focus on one method of data sanitization, namely GOST R 50739-95.

GOST R 50739-95 method
01:15

This discussion will focus on some methods of data sanitization, namely Gutmann, Schneier and Pfitzner.

Gutmann, Schneier and Pfitzner methods
02:26

This discussion will focus on one method of data sanitization, namely Random Data Sanitization method.

Random Data Sanitization Method
00:45

This discussion will focus on one method of data sanitization, namely the Write Zero method.

Write Zero method
00:47

Section 4 - Quiz
6 questions

This PDF file contains Section 4 of this course. You can download the complete e book at the end of this course.

Reading Assignment Section 4
16 pages
+
Data Remanence
9 Lectures 20:37

In this lecture, we'll discuss some objectives aimed at showing what you can expect to learn from this course.

Section Outline

Lecture 50: Introduction to Data Remanence

Lecture 51: History of Data Remanence

Lecture 52: Causes of Data Remanence

Lecture 53: Problem with Data Remanence

Lecture 54: Avoiding Data Remanence Attacks in SRAM

Lecture 55: Counter Measures

Lecture 56: Standards

Preview 00:29

This lecture will provide an introduction to data remanence.

Introduction to Data Remanence
01:43

This lecture will talk about the history of data remanence.

History of Data Remanence
00:40

This lecture will identify some causes of data remanence.

Causes of Data Remanence
02:27

This discussion will focus on some problems caused by data remanence.

.

Lecture outline:

0:00    Problems Caused by Data Remanence
1:21    Data Remanence Attacks
2:31    A User Scenario
4:40    Low Temperature Data Remenance Attacks
Problem with Data Remanence
05:38

This discussion will center on avoiding data remanence attacks.

.

Lecture outline:

0:00    Design Techniques
1:58    Moving the Keys Periodically
3:40    Program the SRAM with Random
	Sequencing during Power Off
Avoiding Data Remanence Attacks in SRAM
05:10

This lecture will explain some countermeasures in dealing with data remanence.

.

Lecture outline:

0:00    Categories of Countermeasures
0:11    Clearing
0:45    Purging / Sanitizing
1:26    Destruction
Counter Measures
02:00

This lecture will discuss some standards about data remanence.

Standards
02:30

Section 5 - Quiz
6 questions

This PDF file contains Section 5 of this course. You can download the complete e book at the end of this course.

Reading Assignment Section 5
12 pages
+
Data Destruction
10 Lectures 19:41

In this lecture, we'll discuss some objectives aimed at showing what you can expect to learn from this course.

Section Outline

Lecture 59: Introduction to Data Destruction

Lecture 60: Introduction to the Methods of Data Destruction

Lecture 61: Delete / Format

Lecture 62: Degaussing

Lecture 63: Physical Destruction

Lecture 64: Software Overwrite

Lecture 65: Dead Storage

Lecture 66: Importance of Data Destruction

Preview 00:28

This lecture will discuss the destruction of data.

Introduction to Data Destruction
03:37

This lecture will include the different methods of data destruction.

Introduction to the Methods of Data Destruction
00:13

This lecture will discuss one of the methods of data destruction, specifically delete / format.

.

Lecture outline:

0:00    Introduction to the Delete / Format Method of Data Destruction
0:46    Advantages
0:54    Disadvantages
Delete / Format
01:20

This lecture will discuss one of the methods of data destruction, specifically degaussing.

.

Lecture outline:

0:00    Introduction to the Degaussing
	Methods of Data Destruction
1:35    Advantages
1:54    Disadvantages
Degaussing
02:51

This lecture will discuss one of the methods of data destruction, specifically physical destruction.

.

Lecture outline:

0:00    Introduction to the Physical Destruction
	of Methods of Data Destruction
1:33    Advantages
1:47    Disadvantages
Physical Destruction
02:29

This lecture will discuss one of the methods of data destruction, specifically software overwrite.

.

Lecture outline:

0:00    Introduction to the Software Overwrite
	Methods of Data Destruction
2:18    Advantages
3:14    Disadvantages
Software Overwrite
03:57

This lecture will discuss one of the methods of data destruction, specifically dead storage.

.

Lecture outline:

0:00    Introduction to the Dead Storage
	Methods of Data Destruction
0:43    Advantages
0:58    Disadvantages
Dead Storage
01:22

This discussion will address the importance of data destruction.

.

Lecture outline:

0:00    Introduction to the Importance
	of Data Destruction
0:32    Protecting Your Ideas
1:16    Protecting Your Customers
2:21    Protecting Your Reputation
Importance of Data Destruction
03:24

Section 6 - Quiz
6 questions

This PDF file contains Section 6 of this course. You can download the complete e book at the end of this course.

Reading Assignment Section 6
12 pages
+
Erasure of Different Types of Media
7 Lectures 21:43

In this lecture, we'll discuss some objectives aimed at showing what you can expect to learn from this course.

Section Outline

Lecture 69: Computer Hard Drive

Lecture 70: Printer Hard Drive

Lecture 71: USB and Other Flash Media

Lecture 72: Flash Hard Drive

Lecture 73: Zip, Jaz and Rev Disks

Preview 00:30

This discussion will focus on the erasure of one of the different types of media, namely the computer hard drive.

.

Lecture outline:

0:00    Introduction to Computer Hard Drive
2:07    Advantages of Removing Data
3:14    Disadvantages of Removing Data
Computer Hard Drive
05:54

This discussion will focus on the erasure of one of the different types of media, namely the printer hard drive.

.

Lecture outline:

0:00    Introduction to Printer Hard Drive
0:58    Advantages of Removing Data
2:11    Disadvantages of Removing Data
Printer Hard Drive
04:40

This discussion will focus on the erasure of some of the different types of media, namely the USB and other flash media.

.

Lecture outline:

0:00    Introduction to USB and Other Flash Media
0:58    Advantages of Removing Data
1:32    Disadvantages of Removing Data
USB and Other Flash Media
02:45

This discussion will focus on the erasure of one of the different types of media, namely the flash hard drive.

.

Lecture outline:

0:00    Introduction to Flash Hard Drive
1:11    Advantages of Removing Data
1:59    Disadvantages of Removing Data
Flash Hard Drive
03:07

This discussion will focus on the erasure of different types of media, namely zip, jaz, and rev disks.

.

Lecture outline:

0:00    Introduction to Zip, Jaz, and Rev disks
1:38    Advantages of Removing Data
2:35    Disadvantages of Removing Data
Zip, Jaz and Rev Disks
04:47

Section 7 - Quiz
6 questions

This PDF file contains Section 7 of this course. You can download the complete e book at the end of this course.

Reading Assignment Section 7
15 pages
+
Course Resources
3 Lectures 00:00

This e book contains the entire Data Wiping and Destruction course in a PDF format.

Data Wiping and Destruction Complete Certification Kit Book
130 pages

This e book is a list of terms and definitions often used in the field of data wiping and destruction.

Data Wiping and Destruction Glossary of Terms
3 pages

This PDF file contains all the answers to all the quizzes in each section of this course.

Quiz Answer Sheet
7 pages
+
Data Wiping and Destruction Certification
3 Lectures 01:27

Now that you've finished your Udemy course, - you are eligible to sit your official Certification exam.

Certification is not mandatory.

Once you've completed the course, email our exam department at exams@artofservice.com.au to purchase your exam voucher and sit your final exam.

. Access includes a step-by-step procedure on how to take the final exam and how to obtain your exam certification.

You will receive a PDF certificate through your email upon passing the examination.

Final Exam
1 page

We are always in the process of improving our courses and procedures for a better learning experience for our students. Your input is very important to us.

Follow the step-by-step procedure on taking the evaluation and receiving your certificate of completion.

Evaluation Form
1 page

A final message from our CEO.

Conclusion - Final Lecture
01:27
About the Instructor
The Art Of Service
3.4 Average rating
389 Reviews
4,798 Students
57 Courses
Quality education for Career Driven IT Professionals

What drives us?

In one word? YOU

You are front, center and behind every decision we make in our business.

  • You are starting out in the IT industry
  • You are serious about your career
  • You need certifications on your resume to get that first interview

For you we created the Foundation level courses as well as the Core Series for IT

  • You are an IT Professional with a proven career
  • You need to stay in touch with changes in the industry
  • You need to continue to show your value to the business to ensure your job is secure
  • You want to find out what else would make your IT career more solid

For you we created the Specialist and Intermediate level courses as well as the Core Series for IT

  • You are implementing Processes and methodologies in your company
  • You are managing a team of people and need to look good
  • You started your own business and are looking for template documents to ‘hit the ground running’
  • You need to present on a subject at the next team meeting and are not quite sure where to start

For you we created the Toolkits as well as the Core Series for IT


Our motto:
Every Career driven IT Professional needs to be able to afford quality IT educational materials to stay relevant in their job, irrespective of current position, budget or geographical location.

We do most of the work behind the scenes so that you can focus on your professional education and your career within the IT industry.

We see it as our job to ensure we give you the most up to date information you need to succeed in achieving that goal at a price-point that is makes it accessible to most professionals.