Section 1 : Overview of Data Security
|
Lecture 1 | Introduction and Objectives | 00:00:20 Duration |
|
Lecture 2 | Data Security | 00:08:41 Duration |
|
Lecture 3 | International Laws and Standards | 00:00:59 Duration |
|
Lecture 4 | Data Breach | 00:03:06 Duration |
|
Lecture 5 | Data Remanence | |
|
Lecture 6 | Data Theft | 00:02:21 Duration |
|
Lecture 7 | Wireless Identity Theft | 00:02:21 Duration |
Section 2 : Information Security
|
Lecture 1 | Introduction and Objectives | 00:00:21 Duration |
|
Lecture 2 | Information Security | 00:06:08 Duration |
|
Lecture 3 | Terminology | 00:10:08 Duration |
Section 3 : Managing Risks
|
Lecture 1 | Introduction and Objectives | 00:00:24 Duration |
|
Lecture 2 | Risk Management | 00:04:15 Duration |
|
Lecture 3 | Types of Controls | 00:03:51 Duration |
|
Lecture 4 | Potential Risk Treatments | 00:05:46 Duration |
|
Lecture 5 | Single Loss Expectancy | 00:00:52 Duration |
Section 4 : Protecting and SecuringData/Information
|
Lecture 1 | Introduction and Objectives | 00:00:19 Duration |
|
Lecture 2 | Active Hard Drive Proctection | 00:01:43 Duration |
|
Lecture 3 | Air Gap | 00:03:21 Duration |
|
Lecture 4 | Anomaly Detection | 00:02:19 Duration |
|
Lecture 5 | Back Up | |
|
Lecture 6 | Cloud Service Gateway | 00:03:05 Duration |
|
Lecture 7 | Firewall | 00:07:51 Duration |
|
Lecture 8 | Types of Firewall | 00:06:55 Duration |
|
Lecture 9 | Security of ATM's | 00:08:58 Duration |
|
Lecture 10 | Standard of Good Practice | 00:02:56 Duration |
Section 5 : Back Up
|
Lecture 1 | Introduction and Objectives | 00:00:16 Duration |
|
Lecture 2 | Back Up | |
|
Lecture 3 | Repository Models | 00:04:05 Duration |
|
Lecture 4 | Storage Media | 00:05:00 Duration |
|
Lecture 5 | Managing the Data Repository | 00:03:36 Duration |
|
Lecture 6 | Live Data | |
|
Lecture 7 | Manipulation | 00:01:43 Duration |
|
Lecture 8 | Limitations | 00:03:56 Duration |
|
Lecture 9 | Confusion and Advise | 00:02:33 Duration |
Section 6 : Protecting and SecuringInformationThrough Software
|
Lecture 1 | Introduction and Objectives | |
|
Lecture 2 | BC Wipe | 00:01:33 Duration |
|
Lecture 3 | Data Shredder and Database Monitoring | 00:03:09 Duration |
|
Lecture 4 | DBAN | 00:01:34 Duration |
|
Lecture 5 | Disk Utility | 00:03:17 Duration |
|
Lecture 6 | DHDerase and MyDLP | 00:02:35 Duration |
|
Lecture 7 | Shred | 00:02:20 Duration |
Section 7 : Companies and Organizations
|
Lecture 1 | Introduction and Objectives | 00:00:37 Duration |
|
Lecture 2 | Blancco | 00:03:50 Duration |
|
Lecture 3 | FAST | 00:03:11 Duration |
|
Lecture 4 | ISF | 00:02:46 Duration |
|
Lecture 5 | ISSA | 00:03:06 Duration |
|
Lecture 6 | Jericho Forum | 00:02:22 Duration |
|
Lecture 7 | LogLogic and NISP | 00:03:54 Duration |
|
Lecture 8 | Secure Network and Splunk | 00:02:39 Duration |
Section 8 : Certifications for Data Security
|
Lecture 1 | Introduction and Objectives | 00:00:39 Duration |
|
Lecture 2 | CISSP | 00:06:12 Duration |
|
Lecture 3 | CISM | 00:02:27 Duration |
|
Lecture 4 | CISA | 00:04:46 Duration |
|
Lecture 5 | Holistic Information Security Practitioner | 00:00:46 Duration |
|
Lecture 6 | Q/ISP | 00:03:53 Duration |