Section 1 : Overview of Data Security

lecture 1 Introduction and Objectives 0:20
lecture 2 Data Security 8:41
lecture 3 International Laws and Standards 0:59
lecture 4 Data Breach 3:6
lecture 5 Data Remanence
lecture 6 Data Theft 2:21
lecture 7 Wireless Identity Theft 2:21

Section 2 : Information Security

lecture 8 Introduction and Objectives 0:21
lecture 9 Information Security 6:8
lecture 10 Terminology 10:8

Section 3 : Managing Risks

lecture 11 Introduction and Objectives 0:24
lecture 12 Risk Management 4:15
lecture 13 Types of Controls 3:51
lecture 14 Potential Risk Treatments 5:46
lecture 15 Single Loss Expectancy 0:52

Section 4 : Protecting and SecuringData/Information

lecture 16 Introduction and Objectives 0:19
lecture 17 Active Hard Drive Proctection 1:43
lecture 18 Air Gap 3:21
lecture 19 Anomaly Detection 2:19
lecture 20 Back Up
lecture 21 Cloud Service Gateway 3:5
lecture 22 Firewall 7:51
lecture 23 Types of Firewall 6:55
lecture 24 Security of ATM's 8:58
lecture 25 Standard of Good Practice 2:56

Section 5 : Back Up

lecture 26 Introduction and Objectives 0:16
lecture 27 Back Up
lecture 28 Repository Models 4:5
lecture 29 Storage Media 5:0
lecture 30 Managing the Data Repository 3:36
lecture 31 Live Data
lecture 32 Manipulation 1:43
lecture 33 Limitations 3:56
lecture 34 Confusion and Advise 2:33

Section 6 : Protecting and SecuringInformationThrough Software

lecture 35 Introduction and Objectives
lecture 36 BC Wipe 1:33
lecture 37 Data Shredder and Database Monitoring 3:9
lecture 38 DBAN 1:34
lecture 39 Disk Utility 3:17
lecture 40 DHDerase and MyDLP 2:35
lecture 41 Shred 2:20

Section 7 : Companies and Organizations

lecture 42 Introduction and Objectives 0:37
lecture 43 Blancco 3:50
lecture 44 FAST 3:11
lecture 45 ISF 2:46
lecture 46 ISSA 3:6
lecture 47 Jericho Forum 2:22
lecture 48 LogLogic and NISP 3:54
lecture 49 Secure Network and Splunk 2:39

Section 8 : Certifications for Data Security

lecture 50 Introduction and Objectives 0:39
lecture 51 CISSP 6:12
lecture 52 CISM 2:27
lecture 53 CISA 4:46
lecture 54 Holistic Information Security Practitioner 0:46
lecture 55 Q/ISP 3:53