Data Wiping and Destruction
Data Wiping and Destruction, available at $29.99, has an average rating of 3.7, with 80 lectures, 7 quizzes, based on 27 reviews, and has 176 subscribers.
You will learn about Have a working knowledge of data remanence, data wiping and data destruction. Be aware of the cause of data remenance. Know that file deletion is not the best way to permanently delete files. Take action in protecting their media and responsively removed sensitive data. This course is ideal for individuals who are Recent graduates looking to get a foothold in the IT Industry. or Data Analysts looking to delete, protect, or restore business data and information. or Business owners wanting to learn more about data destruction and wiping techniques. or Managers looking for an effective way of maintaining data security measures. It is particularly useful for Recent graduates looking to get a foothold in the IT Industry. or Data Analysts looking to delete, protect, or restore business data and information. or Business owners wanting to learn more about data destruction and wiping techniques. or Managers looking for an effective way of maintaining data security measures.
Enroll now: Data Wiping and Destruction
Summary
Title: Data Wiping and Destruction
Price: $29.99
Average Rating: 3.7
Number of Lectures: 80
Number of Quizzes: 7
Number of Published Lectures: 70
Number of Curriculum Items: 87
Number of Published Curriculum Objects: 70
Original Price: $39.99
Quality Status: approved
Status: Live
What You Will Learn
- Have a working knowledge of data remanence, data wiping and data destruction.
- Be aware of the cause of data remenance.
- Know that file deletion is not the best way to permanently delete files.
- Take action in protecting their media and responsively removed sensitive data.
Who Should Attend
- Recent graduates looking to get a foothold in the IT Industry.
- Data Analysts looking to delete, protect, or restore business data and information.
- Business owners wanting to learn more about data destruction and wiping techniques.
- Managers looking for an effective way of maintaining data security measures.
Target Audiences
- Recent graduates looking to get a foothold in the IT Industry.
- Data Analysts looking to delete, protect, or restore business data and information.
- Business owners wanting to learn more about data destruction and wiping techniques.
- Managers looking for an effective way of maintaining data security measures.
This introductory course will discuss the cause, problems and countermeasures for data remanence. Aside from that terms like deletion and undeletion will be incorporated in the course. The different methods and each advantage and disadvantage of data wiping and data destruction will also be discussed.
Course Curriculum
Chapter 1: Overview of Data Security and Information Sensitivity
Lecture 1: Introduction and Objectives
Lecture 2: Introduction to Data Security
Lecture 3: Information Security
Lecture 4: Information Sensitivity
Lecture 5: Non-Sensitive Information
Lecture 6: Types of Sensitive Information
Lecture 7: Identity Theft
Lecture 8: Data Leaks
Lecture 9: File Deletion
Lecture 10: Undeletion
Chapter 2: Data Erasure
Lecture 1: Introduction and Objectives
Lecture 2: Introduction to Data Erasure
Lecture 3: Where is Data Located?
Lecture 4: Understanding File Deletion
Lecture 5: Importance of Data Erasure
Lecture 6: Reasons for Data Erasure
Lecture 7: Data Wiping vs Erasing
Lecture 8: Limitations of Erasing
Lecture 9: Benefits of Data Erasure
Lecture 10: Data Breach
Chapter 3: Data Sanitization
Lecture 1: Introduction and Objectives
Lecture 2: Introduction to Data Sanitization
Lecture 3: Data Sanitization Methods
Lecture 4: Best Method
Lecture 5: What Files are Erased, Benefits and Features
Lecture 6: Self Destruct
Lecture 7: Remote Data Deletion
Chapter 4: Data Sanitization Methods
Lecture 1: Introduction and Objectives
Lecture 2: Introduction to Data Sanitization Method
Lecture 3: Secure Erase
Lecture 4: DoD 5220.22-M data sanitization method
Lecture 5: NCSC-TG-025 sanitization method
Lecture 6: AFSSI-5020 sanitization method
Lecture 7: AR 380-19 sanitization method
Lecture 8: NAVSO P-5239-26 sanitization method
Lecture 9: RCMP TSSIT OPS-II data sanitization method
Lecture 10: CSEC ITSG-06 sanitization method
Lecture 11: HMG IS5 sanitization method
Lecture 12: ISM 6.2.92 and NZSIT 402
Lecture 13: Verschlusssache IT Richtlinien
Lecture 14: GOST R 50739-95 method
Lecture 15: Gutmann, Schneier and Pfitzner methods
Lecture 16: Random Data Sanitization Method
Lecture 17: Write Zero method
Chapter 5: Data Remanence
Lecture 1: Introduction and Objectives
Lecture 2: Introduction to Data Remanence
Lecture 3: History of Data Remanence
Lecture 4: Causes of Data Remanence
Lecture 5: Problem with Data Remanence
Lecture 6: Avoiding Data Remanence Attacks in SRAM
Lecture 7: Counter Measures
Lecture 8: Standards
Chapter 6: Data Destruction
Lecture 1: Introduction and Objectives
Lecture 2: Introduction to Data Destruction
Lecture 3: Introduction to the Methods of Data Destruction
Lecture 4: Delete / Format
Lecture 5: Degaussing
Lecture 6: Physical Destruction
Lecture 7: Software Overwrite
Lecture 8: Dead Storage
Lecture 9: Importance of Data Destruction
Chapter 7: Erasure of Different Types of Media
Lecture 1: Introduction and Objectives
Lecture 2: Computer Hard Drive
Lecture 3: Printer Hard Drive
Lecture 4: USB and Other Flash Media
Lecture 5: Flash Hard Drive
Lecture 6: Zip, Jaz and Rev Disks
Chapter 8: Course Resources
Lecture 1: Data Wiping and Destruction Glossary of Terms
Chapter 9: Data Wiping and Destruction Certification
Lecture 1: Final Exam
Lecture 2: Conclusion – Final Lecture
Instructors
-
The Art Of Service
Quality education for Career Driven IT Professionals
Rating Distribution
- 1 stars: 1 votes
- 2 stars: 7 votes
- 3 stars: 5 votes
- 4 stars: 9 votes
- 5 stars: 5 votes
Frequently Asked Questions
How long do I have access to the course materials?
You can view and review the lecture materials indefinitely, like an on-demand channel.
Can I take my courses with me wherever I go?
Definitely! If you have an internet connection, courses on Udemy are available on any device at any time. If you don’t have an internet connection, some instructors also let their students download course lectures. That’s up to the instructor though, so make sure you get on their good side!
You may also like
- Top 10 Video Editing Courses to Learn in November 2024
- Top 10 Music Production Courses to Learn in November 2024
- Top 10 Animation Courses to Learn in November 2024
- Top 10 Digital Illustration Courses to Learn in November 2024
- Top 10 Renewable Energy Courses to Learn in November 2024
- Top 10 Sustainable Living Courses to Learn in November 2024
- Top 10 Ethical AI Courses to Learn in November 2024
- Top 10 Cybersecurity Fundamentals Courses to Learn in November 2024
- Top 10 Smart Home Technology Courses to Learn in November 2024
- Top 10 Holistic Health Courses to Learn in November 2024
- Top 10 Nutrition And Diet Planning Courses to Learn in November 2024
- Top 10 Yoga Instruction Courses to Learn in November 2024
- Top 10 Stress Management Courses to Learn in November 2024
- Top 10 Mindfulness Meditation Courses to Learn in November 2024
- Top 10 Life Coaching Courses to Learn in November 2024
- Top 10 Career Development Courses to Learn in November 2024
- Top 10 Relationship Building Courses to Learn in November 2024
- Top 10 Parenting Skills Courses to Learn in November 2024
- Top 10 Home Improvement Courses to Learn in November 2024
- Top 10 Gardening Courses to Learn in November 2024