Data Wiping and Destruction

An introductory course about understanding data wiping and destruction, data erasure and data sanitization.
3.2 (3 ratings)
Instead of using a simple lifetime average, Udemy calculates a
course's star rating by considering a number of different factors
such as the number of ratings, the age of ratings, and the
likelihood of fraudulent ratings.
77 students enrolled
$19
$50
62% off
Take This Course
  • Lectures 80
  • Length 6 hours
  • Skill Level All Levels
  • Languages English
  • Includes Lifetime access
    30 day money back guarantee!
    Available on iOS and Android
    Certificate of Completion
Wishlisted Wishlist

How taking a course works

Discover

Find online courses made by experts from around the world.

Learn

Take your courses with you and learn anywhere, anytime.

Master

Learn and practice real-world skills and achieve your goals.

About This Course

Published 3/2014 English

Course Description

This introductory course will discuss the cause, problems and countermeasures for data remanence. Aside from that terms like deletion and undeletion will be incorporated in the course. The different methods and each advantage and disadvantage of data wiping and data destruction will also be discussed.

What are the requirements?

  • Basic understanding of the IT industry
  • Knowledge of the English language

What am I going to get from this course?

  • Have a working knowledge of data remanence, data wiping and data destruction.
  • Be aware of the cause of data remenance.
  • Know that file deletion is not the best way to permanently delete files.
  • Take action in protecting their media and responsively removed sensitive data.

What is the target audience?

  • Recent graduates looking to get a foothold in the IT Industry.
  • Data Analysts looking to delete, protect, or restore business data and information.
  • Business owners wanting to learn more about data destruction and wiping techniques.
  • Managers looking for an effective way of maintaining data security measures.

What you get with this course?

Not for you? No problem.
30 day money back guarantee.

Forever yours.
Lifetime access.

Learn on the go.
Desktop, iOS and Android.

Get rewarded.
Certificate of completion.

Curriculum

Section 1: Overview of Data Security and Information Sensitivity
00:35

In this lecture, we'll discuss some objectives aimed at showing what you can expect to learn from this course.

Section Outline

Lecture 2: Introduction to Data Security

Lecture 3: Information Security

Lecture 4: Information Sensitivity

Lecture 5: Non-Sensitive Information

Lecture 6: Types of Sensitive Information

Lecture 7: Identity Theft

Lecture 8: Data Leaks

Lecture 9: File Deletion

Lecture 10: Undeletion

01:09

This lecture will introduce and define data security.

04:35

This lecture will discuss information security.

.

Lecture outline:

0:00    Information Security
0:40    Introduction to the CIA Triad
0:51    Confidentiality
1:58    Integrity
3:31    Availability
02:10

This lecture will explain the sensitivity of information.

00:54

This lecture will explain the non-sensitivity of information.

03:02

This lecture will identify the different types of sensitive information.

.

Lecture outline:

0:00    Introduction to Different Types
	of Sensitive Information
0:11    Personal and Private Information
1:57    Confidential Business Information
2:17    Classified Information
01:02

This discussion will focus on identity theft.

01:19

This lecture will explain data leaks.

02:36

This lecture will discuss file deletion.

.

Lecture outline:

0:00    Introduction to File Deletion
0:30    Problem with Accidental Deletion
1:49    Problem with Sensitive Data
02:21

This lecture will talk about the undeletion of data.

.

Lecture outline:

0:00    Introduction to Undeletion of Data
0:36    Support
1:45    Limitations
2:12    Prevention
Section 1 - Quiz
6 questions
11 pages

This PDF file contains Section 1 of this course. You can download the complete e book at the end of this course.

Section 2: Data Erasure
00:27

In this lecture, we'll discuss some objectives aimed at showing what you can expect to learn from this course.

Section Outline

Lecture 13: Introduction to Data Erasure

Lecture 14: Where is Data Located?

Lecture 15: Understanding File Deletion

Lecture 16: Importance of Data Erasure

Lecture 17: Reasons for Data Erasure

Lecture 18: Data Wiping vs Erasing

Lecture 19: Limitations of Erasing

Lecture 20: Benefits of Data Erasure

Lecture 21: Data Breach

03:16

This lecture will cover erasure of data.

01:02

This lecture will talk about where data is located.

03:59

This lecture will talk about understanding file deletion.

.

Lecture outline:

0:00    Understanding File Deletion
2:49    What are the Risks?
3:42    Can you Erase Files by Formatting?
03:44

This lecture will discuss the importance of data erasure.

02:01

This lecture will identify some reasons for data erasure.

00:30

This lecture will identify the difference between data wiping and data erasing.

00:29

This lecture will identify some limitations of erasing.

01:03

This lecture will identify the benefits of data erasure.

02:52

This lecture will explain data breach.

Section 2 - Quiz
6 questions
12 pages

This PDF file contains Section 2 of this course. You can download the complete e book at the end of this course.

Section 3: Data Sanitization
00:30

In this lecture, we'll discuss some objectives aimed at showing what you can expect to learn from this course.

Section Outline

Lecture 24: Introduction to Data Sanitization

Lecture 25: Data Sanitization Methods

Lecture 26: Best Method

Lecture 27: What Files are Erased, Benefits and Features

Lecture 28: Self Destruct

Lecture 29: Remote Data Deletion

03:43

This lecture will introduce and define data sanitization.

00:57

This lecture will identify methods of data sanitization.

00:32

This lecture will discuss the best method in data sanitization.

00:55

This lecture will talk about what files should be erased and some benefits and features of data sanitization.

00:51

This lecture will explain self-destruct.

05:50

This lecture will explain deletion of remote data.

.

Lecture outline:

0:00    Introduction to the Deletion of Remote Data
1:12    Laptops
1:37    Mobile Phones
3:09    Apple iPhone
3:51    Google Android
4:28    Microsoft Windows Phone
5:11    RIM BlackBerry OS
Section 3 - Quiz
6 questions
9 pages

This PDF file contains Section 3 of this course. You can download the complete e book at the end of this course.

Section 4: Data Sanitization Methods
00:30

In this lecture, we'll discuss some objectives aimed at showing what you can expect to learn from this course.

Section Outline

Lecture 32: Introduction to Data Sanitization

Lecture 33: Secure Erase

Lecture 34: DoD 5220.22-M data sanitization method

Lecture 35: NCSC-TG-025 sanitization method

Lecture 36: AFSSI-5020 sanitization method

Lecture 37: AR 380-19 sanitization method

Lecture 38: NAVSO P-5239-26 sanitization method

Lecture 39: RCMP TSSIT OPS-II data sanitization method

Lecture 40: CSEC ITSG-06 sanitization method

Lecture 41: HMG IS5 sanitization method

Lecture 42: ISM 6.2.92 and NZSIT 402

Lecture 43: Verschlusssache IT Richtlinien

Lecture 44: GOST R 50739-95 method

Lecture 45: Gutmann, Schneier and Pfitzner methods

Lecture 46: Random Data Sanitization method

Lecture 47: Write Zero method

00:30

This lecture will discuss and identify the different methods of data sanitization.

01:23

This discussion will focus on one method of data sanitization, namely secure erase.

01:47

This discussion will focus on one method of data sanitization, namely DoD 5220.22-M.

00:50

This discussion will focus on one method of data sanitization, namely NCSC-TG-025.

01:13

This discussion will focus on one method of data sanitization, namely AFSSI-5020.

01:09

This discussion will focus on one method of data sanitization, namely AR 380-19.

01:00

This discussion will focus on one method of data sanitization, namely NAVSO P-5239-26.

01:35

This discussion will focus on one method of data sanitization, namely RCMP TSSIT OPS-II.

01:00

This discussion will focus on one method of data sanitization, namely CSEC ITSG-06.

00:53

This discussion will focus on one method of data sanitization, namely HMG IS5.

01:45

This discussion will focus on some methods of data sanitization, namely ISM 6.2.92 and NZSIT 402.

01:40

This discussion will focus on one method of data sanitization, namely Verschlusssache IT Richtlinien.

01:15

This discussion will focus on one method of data sanitization, namely GOST R 50739-95.

02:26

This discussion will focus on some methods of data sanitization, namely Gutmann, Schneier and Pfitzner.

00:45

This discussion will focus on one method of data sanitization, namely Random Data Sanitization method.

00:47

This discussion will focus on one method of data sanitization, namely the Write Zero method.

Section 4 - Quiz
6 questions
16 pages

This PDF file contains Section 4 of this course. You can download the complete e book at the end of this course.

Section 5: Data Remanence
00:29

In this lecture, we'll discuss some objectives aimed at showing what you can expect to learn from this course.

Section Outline

Lecture 50: Introduction to Data Remanence

Lecture 51: History of Data Remanence

Lecture 52: Causes of Data Remanence

Lecture 53: Problem with Data Remanence

Lecture 54: Avoiding Data Remanence Attacks in SRAM

Lecture 55: Counter Measures

Lecture 56: Standards

01:43

This lecture will provide an introduction to data remanence.

00:40

This lecture will talk about the history of data remanence.

02:27

This lecture will identify some causes of data remanence.

05:38

This discussion will focus on some problems caused by data remanence.

.

Lecture outline:

0:00    Problems Caused by Data Remanence
1:21    Data Remanence Attacks
2:31    A User Scenario
4:40    Low Temperature Data Remenance Attacks
05:10

This discussion will center on avoiding data remanence attacks.

.

Lecture outline:

0:00    Design Techniques
1:58    Moving the Keys Periodically
3:40    Program the SRAM with Random
	Sequencing during Power Off
02:00

This lecture will explain some countermeasures in dealing with data remanence.

.

Lecture outline:

0:00    Categories of Countermeasures
0:11    Clearing
0:45    Purging / Sanitizing
1:26    Destruction
02:30

This lecture will discuss some standards about data remanence.

Section 5 - Quiz
6 questions
12 pages

This PDF file contains Section 5 of this course. You can download the complete e book at the end of this course.

Section 6: Data Destruction
00:28

In this lecture, we'll discuss some objectives aimed at showing what you can expect to learn from this course.

Section Outline

Lecture 59: Introduction to Data Destruction

Lecture 60: Introduction to the Methods of Data Destruction

Lecture 61: Delete / Format

Lecture 62: Degaussing

Lecture 63: Physical Destruction

Lecture 64: Software Overwrite

Lecture 65: Dead Storage

Lecture 66: Importance of Data Destruction

03:37

This lecture will discuss the destruction of data.

00:13

This lecture will include the different methods of data destruction.

01:20

This lecture will discuss one of the methods of data destruction, specifically delete / format.

.

Lecture outline:

0:00    Introduction to the Delete / Format Method of Data Destruction
0:46    Advantages
0:54    Disadvantages
02:51

This lecture will discuss one of the methods of data destruction, specifically degaussing.

.

Lecture outline:

0:00    Introduction to the Degaussing
	Methods of Data Destruction
1:35    Advantages
1:54    Disadvantages
02:29

This lecture will discuss one of the methods of data destruction, specifically physical destruction.

.

Lecture outline:

0:00    Introduction to the Physical Destruction
	of Methods of Data Destruction
1:33    Advantages
1:47    Disadvantages
03:57

This lecture will discuss one of the methods of data destruction, specifically software overwrite.

.

Lecture outline:

0:00    Introduction to the Software Overwrite
	Methods of Data Destruction
2:18    Advantages
3:14    Disadvantages
01:22

This lecture will discuss one of the methods of data destruction, specifically dead storage.

.

Lecture outline:

0:00    Introduction to the Dead Storage
	Methods of Data Destruction
0:43    Advantages
0:58    Disadvantages
03:24

This discussion will address the importance of data destruction.

.

Lecture outline:

0:00    Introduction to the Importance
	of Data Destruction
0:32    Protecting Your Ideas
1:16    Protecting Your Customers
2:21    Protecting Your Reputation
Section 6 - Quiz
6 questions
12 pages

This PDF file contains Section 6 of this course. You can download the complete e book at the end of this course.

Section 7: Erasure of Different Types of Media
00:30

In this lecture, we'll discuss some objectives aimed at showing what you can expect to learn from this course.

Section Outline

Lecture 69: Computer Hard Drive

Lecture 70: Printer Hard Drive

Lecture 71: USB and Other Flash Media

Lecture 72: Flash Hard Drive

Lecture 73: Zip, Jaz and Rev Disks

05:54

This discussion will focus on the erasure of one of the different types of media, namely the computer hard drive.

.

Lecture outline:

0:00    Introduction to Computer Hard Drive
2:07    Advantages of Removing Data
3:14    Disadvantages of Removing Data
04:40

This discussion will focus on the erasure of one of the different types of media, namely the printer hard drive.

.

Lecture outline:

0:00    Introduction to Printer Hard Drive
0:58    Advantages of Removing Data
2:11    Disadvantages of Removing Data
02:45

This discussion will focus on the erasure of some of the different types of media, namely the USB and other flash media.

.

Lecture outline:

0:00    Introduction to USB and Other Flash Media
0:58    Advantages of Removing Data
1:32    Disadvantages of Removing Data
03:07

This discussion will focus on the erasure of one of the different types of media, namely the flash hard drive.

.

Lecture outline:

0:00    Introduction to Flash Hard Drive
1:11    Advantages of Removing Data
1:59    Disadvantages of Removing Data
04:47

This discussion will focus on the erasure of different types of media, namely zip, jaz, and rev disks.

.

Lecture outline:

0:00    Introduction to Zip, Jaz, and Rev disks
1:38    Advantages of Removing Data
2:35    Disadvantages of Removing Data
Section 7 - Quiz
6 questions
15 pages

This PDF file contains Section 7 of this course. You can download the complete e book at the end of this course.

Section 8: Course Resources
130 pages

This e book contains the entire Data Wiping and Destruction course in a PDF format.

3 pages

This e book is a list of terms and definitions often used in the field of data wiping and destruction.

7 pages

This PDF file contains all the answers to all the quizzes in each section of this course.

Section 9: Data Wiping and Destruction Certification
1 page

Now that you've finished your Udemy course, - you are eligible to sit your official Certification exam.

Certification is not mandatory.

Once you've completed the course, email our exam department at exams@artofservice.com.au to purchase your exam voucher and sit your final exam.

. Access includes a step-by-step procedure on how to take the final exam and how to obtain your exam certification.

You will receive a PDF certificate through your email upon passing the examination.

1 page

We are always in the process of improving our courses and procedures for a better learning experience for our students. Your input is very important to us.

Follow the step-by-step procedure on taking the evaluation and receiving your certificate of completion.

01:27

A final message from our CEO.

Students Who Viewed This Course Also Viewed

  • Loading
  • Loading
  • Loading

Instructor Biography

The Art Of Service, Quality education for Career Driven IT Professionals

What drives us?

In one word? YOU

You are front, center and behind every decision we make in our business.

  • You are starting out in the IT industry
  • You are serious about your career
  • You need certifications on your resume to get that first interview

For you we created the Foundation level courses as well as the Core Series for IT

  • You are an IT Professional with a proven career
  • You need to stay in touch with changes in the industry
  • You need to continue to show your value to the business to ensure your job is secure
  • You want to find out what else would make your IT career more solid

For you we created the Specialist and Intermediate level courses as well as the Core Series for IT

  • You are implementing Processes and methodologies in your company
  • You are managing a team of people and need to look good
  • You started your own business and are looking for template documents to ‘hit the ground running’
  • You need to present on a subject at the next team meeting and are not quite sure where to start

For you we created the Toolkits as well as the Core Series for IT


Our motto:
Every Career driven IT Professional needs to be able to afford quality IT educational materials to stay relevant in their job, irrespective of current position, budget or geographical location.

We do most of the work behind the scenes so that you can focus on your professional education and your career within the IT industry.

We see it as our job to ensure we give you the most up to date information you need to succeed in achieving that goal at a price-point that is makes it accessible to most professionals.

Ready to start learning?
Take This Course