System and Privacy Data Protection
Focused View
4:30:20
157 View
01-System and Privacy Data Protection - Introduction.mp4
00:53
02-Learning objectives.mp4
00:21
03-1.1 Privacy vs. Security.mp4
05:06
04-1.2 Non-technical Controls.mp4
04:58
05-1.3 Classification, Ownership, Retention, and Data Types.mp4
09:44
06-1.4 Confidentiality, Legal Requirements, and Data Sovereignty.mp4
07:05
07-1.5 Data Minimization, Purpose Limitation, and NDA.mp4
01:18
08-1.6 Technical Controls.mp4
01:06
09-1.7 Encryption.mp4
04:22
10-1.8 Data Loss Prevention (DLP).mp4
01:02
11-1.9 Data Masking and Deidentification.mp4
02:24
12-1.10 Tokenization.mp4
01:09
13-1.11 Digital Rights Management (DRM) and Watermarking.mp4
03:01
14-1.12 Geographic Access Requirements.mp4
02:05
15-1.13 Access Controls.mp4
01:06
16-Learning objectives.mp4
00:23
17-2.1 Business Impact and Risk Calculation.mp4
01:03
18-2.2 Communication Risk Factors and Risk Prioritization.mp4
05:05
19-2.3 System Assessments.mp4
03:18
20-2.4 Compensating Controls and Training - Part 1.mp4
10:39
21-2.5 Compensating Controls and Training - Part 2.mp4
06:55
22-2.6 Supply Chain Assessment.mp4
03:59
23-Learning objectives.mp4
00:23
24-3.1 Frameworks.mp4
02:05
25-3.2 AUP, Password Policies, Data Ownership, and Other Procedures.mp4
08:41
26-3.3 Control Types.mp4
08:54
27-3.4 Audits and Assessments.mp4
05:19
28-Learning objectives.mp4
00:19
29-4.1 Event Logs.mp4
03:44
30-4.2 Syslogs.mp4
09:04
31-4.3 Firewall Logs.mp4
08:23
32-4.4 Web Application Firewall (WAF).mp4
06:08
33-4.5 Proxy.mp4
12:54
34-4.6 Intrusion Detection and Prevention (IDS IPS).mp4
07:59
35-4.7 Impact Analysis.mp4
12:45
36-4.8 Organizations Impact vs. Localized Impact.mp4
01:37
37-4.9 Immediate vs. Total.mp4
01:25
38-Learning objectives.mp4
00:20
39-5.1 Security Information and Event Management (SIEM) - Part 1.mp4
06:50
40-5.2 Security Information and Event Management (SIEM) - Part 2.mp4
11:30
41-5.3 Rule Writing.mp4
03:40
42-5.4 Known-bad Internet Protocol (IP).mp4
03:12
43-Learning objectives.mp4
00:24
44-6.1 Malicious Payload.mp4
12:01
45-6.2 Domain Keys Identified Mail (DKIM).mp4
07:43
46-6.3 Domain-based Message.mp4
07:58
47-6.4 Embedded Links.mp4
03:21
48-6.5 Impersonation.mp4
01:07
49-6.6 Header.mp4
01:48
50-Learning objectives.mp4
00:25
51-7.1 Workflow Orchestration.mp4
07:31
52-7.2 Security Orchestration.mp4
02:09
53-7.3 Security Orchestration, Automation, and Response (SOAR).mp4
03:37
54-7.4 Scripting.mp4
02:53
55-7.5 Application Programming Interface (API) Integration.mp4
03:20
56-7.6 Automated Malware Signature Creation.mp4
01:38
57-7.7 Data Encrichment.mp4
02:55
58-7.8 Threat Feed Combination.mp4
02:03
59-7.9 Machine Learning.mp4
11:26
60-7.10 Security Content Automation Protocol (SCAP).mp4
01:37
61-7.11 Continuous Integration.mp4
02:23
62-7.12 Continuous Deployment and Delivery.mp4
01:10
63-System and Privacy Data Protection - Summary.mp4
00:37
More details
User Reviews
Rating
average 0
Focused display

LiveLessons
View courses LiveLessonsPearson's video training library is an indispensable learning tool for today's competitive job market. Having essential technology training and certifications can open doors for career advancement and life enrichment. We take learning personally. We've published hundreds of up-to-date videos on wide variety of key topics for Professionals and IT Certification candidates. Now you can learn from renowned industry experts from anywhere in the world, without leaving home.
- language english
- Training sessions 63
- duration 4:30:20
- English subtitles has
- Release Date 2023/11/04