Section 1 : Overview of Data Security

Lecture 1 Introduction and Objectives 00:00:20 Duration
Lecture 2 Data Security 00:08:41 Duration
Lecture 3 International Laws and Standards 00:00:59 Duration
Lecture 4 Data Breach 00:03:06 Duration
Lecture 5 Data Remanence
Lecture 6 Data Theft 00:02:21 Duration
Lecture 7 Wireless Identity Theft 00:02:21 Duration

Section 2 : Information Security

Lecture 1 Introduction and Objectives 00:00:21 Duration
Lecture 2 Information Security 00:06:08 Duration
Lecture 3 Terminology 00:10:08 Duration

Section 3 : Managing Risks

Lecture 1 Introduction and Objectives 00:00:24 Duration
Lecture 2 Risk Management 00:04:15 Duration
Lecture 3 Types of Controls 00:03:51 Duration
Lecture 4 Potential Risk Treatments 00:05:46 Duration
Lecture 5 Single Loss Expectancy 00:00:52 Duration

Section 4 : Protecting and SecuringData/Information

Lecture 1 Introduction and Objectives 00:00:19 Duration
Lecture 2 Active Hard Drive Proctection 00:01:43 Duration
Lecture 3 Air Gap 00:03:21 Duration
Lecture 4 Anomaly Detection 00:02:19 Duration
Lecture 5 Back Up
Lecture 6 Cloud Service Gateway 00:03:05 Duration
Lecture 7 Firewall 00:07:51 Duration
Lecture 8 Types of Firewall 00:06:55 Duration
Lecture 9 Security of ATM's 00:08:58 Duration
Lecture 10 Standard of Good Practice 00:02:56 Duration

Section 5 : Back Up

Lecture 1 Introduction and Objectives 00:00:16 Duration
Lecture 2 Back Up
Lecture 3 Repository Models 00:04:05 Duration
Lecture 4 Storage Media 00:05:00 Duration
Lecture 5 Managing the Data Repository 00:03:36 Duration
Lecture 6 Live Data
Lecture 7 Manipulation 00:01:43 Duration
Lecture 8 Limitations 00:03:56 Duration
Lecture 9 Confusion and Advise 00:02:33 Duration

Section 6 : Protecting and SecuringInformationThrough Software

Lecture 1 Introduction and Objectives
Lecture 2 BC Wipe 00:01:33 Duration
Lecture 3 Data Shredder and Database Monitoring 00:03:09 Duration
Lecture 4 DBAN 00:01:34 Duration
Lecture 5 Disk Utility 00:03:17 Duration
Lecture 6 DHDerase and MyDLP 00:02:35 Duration
Lecture 7 Shred 00:02:20 Duration

Section 7 : Companies and Organizations

Lecture 1 Introduction and Objectives 00:00:37 Duration
Lecture 2 Blancco 00:03:50 Duration
Lecture 3 FAST 00:03:11 Duration
Lecture 4 ISF 00:02:46 Duration
Lecture 5 ISSA 00:03:06 Duration
Lecture 6 Jericho Forum 00:02:22 Duration
Lecture 7 LogLogic and NISP 00:03:54 Duration
Lecture 8 Secure Network and Splunk 00:02:39 Duration

Section 8 : Certifications for Data Security

Lecture 1 Introduction and Objectives 00:00:39 Duration
Lecture 2 CISSP 00:06:12 Duration
Lecture 3 CISM 00:02:27 Duration
Lecture 4 CISA 00:04:46 Duration
Lecture 5 Holistic Information Security Practitioner 00:00:46 Duration
Lecture 6 Q/ISP 00:03:53 Duration