CISA 2022: Data Storage & Malware

CISA    |    Expert
  • 17 videos | 1h 50m 18s
  • Includes Assessment
  • Earns a Badge
Data storage and malware get their fair share of attention when considering data, information, and privacy. Rightly so, as they represent key concerns for the security-minded information technology manager. In this course, explore data storage and malware, beginning with an overview of data vs. information, big data and data analytics, and storage area network (SAN) security. Next, learn how to secure an iSCSI SAN and about cloud storage security, storage media disposal, database security, and database availability. Finally, examine data backup and restore strategies, cloud-based data backups, social engineering, and security awareness training. This course helps prepare learners for the ISACA certification exam, Certified Information Systems Auditor (CISA).

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Distinguish between data and information and describe how they are secured
    Identify the relationship between big data and the value of data analytics
    List methods for securing a storage area network (san)
    Enable password authentication for iscsi target access
    Recognize common security options available with cloud storage
    Ensure that decommissioned storage media does not contain retrievable data artifacts
    Identify common database hardening techniques
    Deploy microsoft sql database in the azure cloud
  • Outline data availability strategies, including whether security controls are still in place after data recovery
    Protect data using the windows backup feature
    Protect data by backing it up to the cloud
    Distinguish between malware types
    Identify the various forms of social engineering and the related security risks
    Outline key principles, activities, and best practices surrounding security awareness training
    Summarize the key concepts covered in this course
    Distinguish between various types of backup and identify data resiliency methods using redundant array of independent disks (raid)

IN THIS COURSE

  • 1m 11s
    In this video, we will discover the key concepts covered in this course. FREE ACCESS
  • 5m 46s
    After completing this video, you will be able to distinguish between data and information and describe how they are secured. FREE ACCESS
  • Locked
    3.  Big Data and Data Analytics
    3m 55s
    Upon completion of this video, you will be able to identify the relationship between big data and the value of data analytics. FREE ACCESS
  • Locked
    4.  Storage Area Network (SAN) Security
    8m 34s
    In this video, we will list methods for securing a storage area network (SAN). FREE ACCESS
  • Locked
    5.  Securing an iSCSI Storage Area Network (SAN)
    9m 37s
    Find out how to enable password authentication for iSCSI target access. FREE ACCESS
  • Locked
    6.  Cloud Storage Security
    6m 1s
    In this video, you will recognize common security options available with cloud storage. FREE ACCESS
  • Locked
    7.  Disposing of Storage Media
    6m 20s
    During this video, discover how to ensure that decommissioned storage media does not contain retrievable data artifacts. FREE ACCESS
  • Locked
    8.  Database Security
    8m 19s
    After completing this video, you will be able to identify common database hardening techniques. FREE ACCESS
  • Locked
    9.  Deploying Cloud-based Microsoft SQL Databases
    9m 50s
    Learn how to deploy Microsoft SQL Database in the Azure cloud. FREE ACCESS
  • Locked
    10.  Data Backup and Restore Strategies
    8m 27s
    In this video, we will outline data availability strategies, including whether security controls are still in place after data recovery. FREE ACCESS
  • Locked
    11.  Data Backup Methods and Data Availability
    9m 50s
    Discover how to protect data using the Windows Backup feature. FREE ACCESS
  • Locked
    12.  Backing Up On-premises Data
    6m 39s
    In this video, find out how to protect data by backing it up to the cloud. FREE ACCESS
  • Locked
    13.  Backing Up Cloud-based Data
    7m 35s
    In this video, you will distinguish between malware types. FREE ACCESS
  • Locked
    14.  Types of Malware
    4m 48s
    Upon completion of this video, you will be able to identify the various forms of social engineering and the related security risks. FREE ACCESS
  • Locked
    15.  Social Engineering
    7m 13s
    After completing this video, you will be able to outline key principles, activities, and best practices surrounding security awareness training. FREE ACCESS
  • Locked
    16.  Security Awareness Training
    5m 4s
    In this video, we will summarize the key concepts covered in this course. FREE ACCESS
  • Locked
    17.  Course Summary
    1m 7s
    In this video, find out how to distinguish between various types of backup and identify data resiliency methods using redundant array of independent disks (RAID). FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE