Companies Home Search Profile

Security Tips: Protecting Sensitive Information

Focused View

Scott Simpson

1:39:11

0 View
  • 01 - Protecting sensitive information.mp4
    00:49
  • 02 - Strategies for securing information.mp4
    02:52
  • 03 - Important disclaimers.mp4
    01:18
  • 04 - File metadata.mp4
    08:27
  • 05 - File integrity.mp4
    04:07
  • 06 - Obscuring information in files.mp4
    02:57
  • 07 - Securely deleting files.mp4
    02:26
  • 08 - File system permissions.mp4
    01:54
  • 09 - Shared key and public key encryption.mp4
    05:41
  • 10 - Software-specific file protection.mp4
    02:19
  • 11 - File encryption with Kleopatra on Windows or Linux.mp4
    07:09
  • 12 - File encryption with GPG Suite on macOS.mp4
    04:31
  • 13 - Encrypted disks and disk images.mp4
    03:38
  • 14 - Encrypted disk using BitLocker on Windows.mp4
    03:43
  • 15 - Encrypted disk image using BitLocker on Windows.mp4
    04:11
  • 16 - Encrypted disk using FileVault on macOS.mp4
    04:17
  • 17 - Encrypted disk image using Disk Utility on macOS.mp4
    05:06
  • 18 - Encrypted disk using LUKS on Linux.mp4
    05:39
  • 19 - Encrypted disk image using LUKS on Linux.mp4
    02:16
  • 20 - Cross-platform encrypted disk with VeraCrypt.mp4
    06:53
  • 21 - Cross-platform encrypted disk image with VeraCrypt.mp4
    04:33
  • 22 - Employing secure practices.mp4
    02:23
  • 23 - Ensuring security of web connections.mp4
    04:09
  • 24 - Understanding VPN.mp4
    01:45
  • 25 - Encrypted email.mp4
    02:20
  • 26 - Security of cloud storage.mp4
    02:05
  • 27 - Next steps.mp4
    01:43
  • Ex Files Security Tips Protect Sensitive Info.zip
  • Description


    While we often think of our communications channels as secure, it never hurts to add an extra layer of protection when working with sensitive information. Whether it’s personal documents, trade secrets, or any other kind of information that could be misused in the wrong hands, knowing how to secure data is a skill that anyone can benefit from. Learn tips to protect and exchange your sensitive information using encryption and other tools. In this course, instructor Scott Simpson discusses the basics of encryption and demonstrates how to protect sensitive information using encrypted files, disks, and disk images. He introduces encryption tools for every operating system—including BitLocker, FileVault, and LUKS—as well as the cross-platform VeraCrypt app. Plus, learn best practices for multilayer security, web connections, VPN, email, and cloud storage.

    More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Category
    Scott Simpson
    Scott Simpson
    Instructor's Courses
    I write and record video courses on Linux, Open Source, and IT topics. As an educational content producer and author with a strong technology background, I enjoy using my experience to teach others and to advance my own learning with technical projects. I strive to speak to beginner, intermediate, and advanced audiences in an engaging and informative way.
    LinkedIn Learning is an American online learning provider. It provides video courses taught by industry experts in software, creative, and business skills. It is a subsidiary of LinkedIn. All the courses on LinkedIn fall into four categories: Business, Creative, Technology and Certifications. It was founded in 1995 by Lynda Weinman as Lynda.com before being acquired by LinkedIn in 2015. Microsoft acquired LinkedIn in December 2016.
    • language english
    • Training sessions 27
    • duration 1:39:11
    • Release Date 2025/02/25