Companies Home Search Profile

System and Privacy Data Protection

Focused View

4:30:20

157 View
  • 01-System and Privacy Data Protection - Introduction.mp4
    00:53
  • 02-Learning objectives.mp4
    00:21
  • 03-1.1 Privacy vs. Security.mp4
    05:06
  • 04-1.2 Non-technical Controls.mp4
    04:58
  • 05-1.3 Classification, Ownership, Retention, and Data Types.mp4
    09:44
  • 06-1.4 Confidentiality, Legal Requirements, and Data Sovereignty.mp4
    07:05
  • 07-1.5 Data Minimization, Purpose Limitation, and NDA.mp4
    01:18
  • 08-1.6 Technical Controls.mp4
    01:06
  • 09-1.7 Encryption.mp4
    04:22
  • 10-1.8 Data Loss Prevention (DLP).mp4
    01:02
  • 11-1.9 Data Masking and Deidentification.mp4
    02:24
  • 12-1.10 Tokenization.mp4
    01:09
  • 13-1.11 Digital Rights Management (DRM) and Watermarking.mp4
    03:01
  • 14-1.12 Geographic Access Requirements.mp4
    02:05
  • 15-1.13 Access Controls.mp4
    01:06
  • 16-Learning objectives.mp4
    00:23
  • 17-2.1 Business Impact and Risk Calculation.mp4
    01:03
  • 18-2.2 Communication Risk Factors and Risk Prioritization.mp4
    05:05
  • 19-2.3 System Assessments.mp4
    03:18
  • 20-2.4 Compensating Controls and Training - Part 1.mp4
    10:39
  • 21-2.5 Compensating Controls and Training - Part 2.mp4
    06:55
  • 22-2.6 Supply Chain Assessment.mp4
    03:59
  • 23-Learning objectives.mp4
    00:23
  • 24-3.1 Frameworks.mp4
    02:05
  • 25-3.2 AUP, Password Policies, Data Ownership, and Other Procedures.mp4
    08:41
  • 26-3.3 Control Types.mp4
    08:54
  • 27-3.4 Audits and Assessments.mp4
    05:19
  • 28-Learning objectives.mp4
    00:19
  • 29-4.1 Event Logs.mp4
    03:44
  • 30-4.2 Syslogs.mp4
    09:04
  • 31-4.3 Firewall Logs.mp4
    08:23
  • 32-4.4 Web Application Firewall (WAF).mp4
    06:08
  • 33-4.5 Proxy.mp4
    12:54
  • 34-4.6 Intrusion Detection and Prevention (IDS IPS).mp4
    07:59
  • 35-4.7 Impact Analysis.mp4
    12:45
  • 36-4.8 Organizations Impact vs. Localized Impact.mp4
    01:37
  • 37-4.9 Immediate vs. Total.mp4
    01:25
  • 38-Learning objectives.mp4
    00:20
  • 39-5.1 Security Information and Event Management (SIEM) - Part 1.mp4
    06:50
  • 40-5.2 Security Information and Event Management (SIEM) - Part 2.mp4
    11:30
  • 41-5.3 Rule Writing.mp4
    03:40
  • 42-5.4 Known-bad Internet Protocol (IP).mp4
    03:12
  • 43-Learning objectives.mp4
    00:24
  • 44-6.1 Malicious Payload.mp4
    12:01
  • 45-6.2 Domain Keys Identified Mail (DKIM).mp4
    07:43
  • 46-6.3 Domain-based Message.mp4
    07:58
  • 47-6.4 Embedded Links.mp4
    03:21
  • 48-6.5 Impersonation.mp4
    01:07
  • 49-6.6 Header.mp4
    01:48
  • 50-Learning objectives.mp4
    00:25
  • 51-7.1 Workflow Orchestration.mp4
    07:31
  • 52-7.2 Security Orchestration.mp4
    02:09
  • 53-7.3 Security Orchestration, Automation, and Response (SOAR).mp4
    03:37
  • 54-7.4 Scripting.mp4
    02:53
  • 55-7.5 Application Programming Interface (API) Integration.mp4
    03:20
  • 56-7.6 Automated Malware Signature Creation.mp4
    01:38
  • 57-7.7 Data Encrichment.mp4
    02:55
  • 58-7.8 Threat Feed Combination.mp4
    02:03
  • 59-7.9 Machine Learning.mp4
    11:26
  • 60-7.10 Security Content Automation Protocol (SCAP).mp4
    01:37
  • 61-7.11 Continuous Integration.mp4
    02:23
  • 62-7.12 Continuous Deployment and Delivery.mp4
    01:10
  • 63-System and Privacy Data Protection - Summary.mp4
    00:37
  • More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Pearson's video training library is an indispensable learning tool for today's competitive job market. Having essential technology training and certifications can open doors for career advancement and life enrichment. We take learning personally. We've published hundreds of up-to-date videos on wide variety of key topics for Professionals and IT Certification candidates. Now you can learn from renowned industry experts from anywhere in the world, without leaving home.
    • language english
    • Training sessions 63
    • duration 4:30:20
    • English subtitles has
    • Release Date 2023/11/04

    Courses related to Data Protection

    Courses related to Cyber Security

    Courses related to Network Security

    Courses related to Information Security