Learn your way! Get started

Digital Security Awareness, Part 2 of 4: Data

with experts Kenneth Mayer, Mike Biocchi

Watch trailer

Course at a glance

Included in these subscriptions:

  • Dev & IT Pro Video
  • Dev & IT Pro Power Pack

Release date 6/7/2021
Level Beginner
Runtime 1h 3m
Closed captioning N/A
Transcript N/A
eBooks / courseware N/A
Hands-on labs N/A
Sample code N/A
Exams Included

Enterprise Solutions

Need reporting, custom learning tracks, or SCORM? Learn More

Course description

Digital Security Awareness continues in this course with Data Classification as well as what is Data Leakage.


There are no prerequisites.

Meet the experts

As a certified Microsoft Instructor, Ken has focused his career on various security aspects of computer and network technology since the early 1980s. He has offered a wide variety of IT training and high level consulting projects for Fortune 500 companies globally. Through the course of his extensive career, he has taught a full line of Microsoft, CompTIA, Cisco, and other high level IT Security curricula.

Dr. Michael Biocchi completed his PhD and has received his Masters of Science as well as his Bachelor of Computer Science. Michael is a Certified Information Systems Security Professional (CISSP). He is currently a full-time professor teaching a variety of computer science courses. These courses include: Artificial Intelligence, Security and Privacy, Project Management, PHP/MySQL, Distributed Systems, as well as many others. Michael also runs a small consulting business. He works with businesses in developing risk assessment, policy creation, business continuity planning, disaster recovery planning, and security awareness.

Course outline

Data Classification

Data Classification Part 1 (22:22)
  • Introduction (00:08)
  • Policies for Data Sharing (04:32)
  • Privilege Creep (05:29)
  • How to Classify (01:35)
  • Information Value (03:31)
  • How to Classify (Cont.) (01:36)
  • Evaluate and Divide (01:15)
  • How to Classify (Cont. Again) (02:45)
  • Structured and Unstructured Data (01:19)
  • Summary (00:08)
Data Classification Part 2 (17:24)
  • Introduction (00:08)
  • Data Classification (04:11)
  • What Could Happen? (01:54)
  • What Type of Policies? (04:44)
  • Destroying Data (02:56)
  • How to Destroy Data (03:21)
  • Summary (00:08)
Data Leakage (23:19)
  • Introduction (00:08)
  • Data Leakage (01:10)
  • Data Classification (01:38)
  • Frequency (03:45)
  • Accidental vs. Intentional (01:24)
  • Accidental Loss (04:26)
  • Mislabeling Data (03:19)
  • Social Media Leakage (03:05)
  • Preventing Leakage (00:44)
  • Go Slow (00:38)
  • Encrypt and Protect (02:04)
  • Be Safe (00:45)
  • Summary (00:08)