Digital Security Awareness, Part 2 of 4: Data
Interactive

Digital Security Awareness, Part 2 of 4: Data

LearnNow Online
Updated Aug 23, 2018

Course description

This course will explore types of security threats, both digital and physical, It will cover identity theft, data classification: sharing, privileges, and risk management.

Each LearnNowOnline training course is made up of Modules (typically an hour in length). Within each module there are Topics (typically 15-30 minutes each) and Subtopics (typically 2-5 minutes each). There is a Post Exam for each Module that must be passed with a score of 70% or higher to successfully and fully complete the course.


Prerequisites

There are no prerequisites.


Meet the expert

Kenneth Mayer

As a certified Microsoft Instructor, Ken has focused his career on various security aspects of computer and network technology since the early 1980s. He has offered a wide variety of IT training and high level consulting projects for Fortune 500 companies globally. Through the course of his extensive career, he has taught a full line of Microsoft, CompTIA, Cisco, and other high level IT Security curricula.

Video Runtime

67 Minutes

Time to complete

87 Minutes

Course Outline

Data Classification

Identify Theft (27:51)

  • Introduction (00:10)
  • What Is Identity Theft? (01:42)
  • Other Possibilities (00:59)
  • How Does It Happen? (02:56)
  • More Identity Theft Methods (05:54)
  • How to Defend Yourself (Cont.) (06:34)
  • Online Credit Card Use (00:38)
  • What Criminals Do with Your Information (01:51)
  • Other Things Criminals Do (01:17)
  • What Criminals Do with Your Information (Cont.) (01:09)
  • How to Know if You're a Victim (00:39)
  • Actions to Take if You Are a Victim (01:24)
  • Fraud Alerts (01:46)
  • Contact Information (00:38)
  • Summary (00:08)

Data Classification Part 1 (22:22)

  • Introduction (00:08)
  • Policies for Data Sharing (04:32)
  • Privilege Creep (05:29)
  • How to Classify (01:35)
  • Information Value (03:31)
  • How to Classify (Cont.) (01:36)
  • Evaluate and Divide (01:15)
  • How to Classify (Cont. Again) (02:45)
  • Structured and Unstructured Data (01:19)
  • Summary (00:08)

Data Classification Part 2 (17:24)

  • Introduction (00:08)
  • Data Classification (04:11)
  • What Could Happen? (01:54)
  • What Type of Policies? (04:44)
  • Destroying Data (02:56)
  • How to Destroy Data (03:21)
  • Summary (00:08)
;