Learn your way! Get started

Digital Security Awareness, Part 2 of 4: Data

with expert Kenneth Mayer


Watch trailer


Course at a glance

Included in these subscriptions:

  • Dev & IT Pro Video
  • Dev & IT Pro Power Pack

Release date 12/29/2017
Level Beginner
Runtime 1h 7m
Closed captioning N/A
Transcript N/A
eBooks / courseware N/A
Hands-on labs N/A
Sample code N/A
Exams Included


Enterprise Solutions

Need reporting, custom learning tracks, or SCORM? Learn More



Course description

This course will explore types of security threats, both digital and physical, It will cover identity theft, data classification: sharing, privileges, and risk management.

Prerequisites

There are no prerequisites.

Learning Paths

This course is part of the following LearnNowOnline SuccessPaths™:
Security Awareness

Meet the expert

As a certified Microsoft Instructor, Ken has focused his career on various security aspects of computer and network technology since the early 1980s. He has offered a wide variety of IT training and high level consulting projects for Fortune 500 companies globally. Through the course of his extensive career, he has taught a full line of Microsoft, CompTIA, Cisco, and other high level IT Security curricula.

Course outline



Data Classification

Identify Theft (27:51)
  • Introduction (00:10)
  • What Is Identity Theft? (01:42)
  • Other Possibilities (00:59)
  • How Does It Happen? (02:56)
  • More Identity Theft Methods (05:54)
  • How to Defend Yourself (Cont.) (06:34)
  • Online Credit Card Use (00:38)
  • What Criminals Do with Your Information (01:51)
  • Other Things Criminals Do (01:17)
  • What Criminals Do with Your Information (Cont.) (01:09)
  • How to Know if You're a Victim (00:39)
  • Actions to Take if You Are a Victim (01:24)
  • Fraud Alerts (01:46)
  • Contact Information (00:38)
  • Summary (00:08)
Data Classification Part 1 (22:22)
  • Introduction (00:08)
  • Policies for Data Sharing (04:32)
  • Privilege Creep (05:29)
  • How to Classify (01:35)
  • Information Value (03:31)
  • How to Classify (Cont.) (01:36)
  • Evaluate and Divide (01:15)
  • How to Classify (Cont. Again) (02:45)
  • Structured and Unstructured Data (01:19)
  • Summary (00:08)
Data Classification Part 2 (17:24)
  • Introduction (00:08)
  • Data Classification (04:11)
  • What Could Happen? (01:54)
  • What Type of Policies? (04:44)
  • Destroying Data (02:56)
  • How to Destroy Data (03:21)
  • Summary (00:08)