CISSP 2024: Data Lifecycle, Controls, & Compliance

CISSP 2024    |    Expert
  • 12 videos | 34m 27s
  • Includes Assessment
  • Earns a Badge
Rating 5.0 of 2 users Rating 5.0 of 2 users (2)
Data is one of the highest-priority assets that most organizations possess. For CISSP professionals, understanding the data lifecycle to ensure that security measures are applied at each stage to protect sensitive information, controls, and compliance is crucial. Together, these elements form the backbone of a robust security strategy, ensuring that data is managed securely throughout its lifecycle, mitigating risks through effective controls, and meeting legal and regulatory requirements. Begin this course by exploring various data roles like owner, controllers, and processors, as well as in use, in transit, and at rest data states. Then you will delve into the phases of the data lifecycle, including data collection, data location, data maintenance, data retention and remanence, and data destruction. Next, you will compare data scoping to data tailoring and learn how to select appropriate data security and privacy standards. Finally, you will focus on data protection methods, including digital rights management (DRM), data loss prevention (DLP), and cloud access security brokers (CASBs). This course helps prepare learners for the Certified Information Systems Security Professional (CISSP) exam.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Compare data roles, such as owners, controllers, custodians, processors, and users/subjects
    Compare in use, in transit, and at rest data states
    Define the data collection phase of the data lifecycle
    Describe the data phase of the data lifecycle
    Provide an overview of data maintenance and management activities in the data lifecycle
  • Describe data retention and remanence in the data lifecycle, including end of life (eol) and end of support
    Describe data destruction methods in the data lifecycle
    Compare data scoping to data tailoring
    Select from various data security and privacy standards
    Outline data protection methods, including digital rights management (drm), data loss prevention (dlp), and cloud access security brokers (casbs)
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 29s
    In this video, we will discover the key concepts covered in this course. FREE ACCESS
  • 6m 3s
    After completing this video, you will be able to compare data roles, such as owners, controllers, custodians, processors, and users/subjects. FREE ACCESS
  • Locked
    3.  Data States
    2m 19s
    Upon completion of this video, you will be able to compare in use, in transit, and at rest data states. FREE ACCESS
  • Locked
    4.  Data Collection
    3m 36s
    After completing this video, you will be able to define the data collection phase of the data lifecycle. FREE ACCESS
  • Locked
    5.  Data Location
    2m 27s
    Upon completion of this video, you will be able to describe the data phase of the data lifecycle. FREE ACCESS
  • Locked
    6.  Data Maintenance
    3m 31s
    After completing this video, you will be able to provide an overview of data maintenance and management activities in the data lifecycle. FREE ACCESS
  • Locked
    7.  Data Retention and Remanence
    3m 27s
    Upon completion of this video, you will be able to describe data retention and remanence in the data lifecycle, including end of life (EOL) and end of support. FREE ACCESS
  • Locked
    8.  Data Destruction
    1m 31s
    After completing this video, you will be able to describe data destruction methods in the data lifecycle. FREE ACCESS
  • Locked
    9.  Data Scoping and Tailoring
    1m 39s
    Upon completion of this video, you will be able to compare data scoping to data tailoring. FREE ACCESS
  • Locked
    10.  Selecting Data Standards
    2m 45s
    In this video, find out how to select from various data security and privacy standards. FREE ACCESS
  • Locked
    11.  Data Protection Methods
    6m 7s
    After completing this video, you will be able to outline data protection methods, including digital rights management (DRM), data loss prevention (DLP), and cloud access security brokers (CASBs). FREE ACCESS
  • Locked
    12.  Course Summary
    33s
    In this video, we will summarize the key concepts covered in this course. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.5 of 33 users Rating 4.5 of 33 users (33)
Rating 4.9 of 24 users Rating 4.9 of 24 users (24)