CompTIA IT Fundamentals: Privacy & Encryption

IT Fundamentals    |    Beginner
  • 15 videos | 1h 28m 16s
  • Includes Assessment
  • Earns a Badge
Rating 4.9 of 22 users Rating 4.9 of 22 users (22)
In an information age, privacy and security are of paramount importance. We've seen numerous examples of the damage done when information is compromised. With this in mind, organizations spend vast resources to keep information safe and secure for good reason. In this course, you will learn about privacy and encryption, beginning with the basics of Internet and computing privacy. Then you'll explore software and network privacy considerations, security policies and procedures, regulations and considerations for handling information, and password best practices. Finally, you'll delve into encryption technologies and the importance of protecting data at rest and data in transit. This course helps prepare learners for the CompTIA IT Fundamentals (ITF+) certification exam, FC0-U61.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Provide an overview of internet privacy concerns
    Outline expectations for privacy when using social networking sites
    Outline expectations for privacy when using email
    Outline expectations for privacy when sharing files
    Outline expectations for privacy when using instant messaging
    Outline expectations for privacy when using software, including desktop and mobile applications
    Outline expectations for privacy when using computer networks
  • Identify common methods for establishing and using security and privacy policies
    Outline regulations protecting private information and common methods for handling confidential information
    Identify best practices for enforcing password policy
    Provide an overview of computer encryption, its basic functionality, and why it is needed
    Provide an overview of data at rest and how it can be protected by encryption
    Provide an overview of data in transit and how it can be protected by encryption
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 7s
    In this video, we will discover the key concepts covered in this course. FREE ACCESS
  • 7m 21s
    Upon completion of this video, you will be able to provide an overview of internet privacy concerns. FREE ACCESS
  • Locked
    3.  Social Networking Privacy
    5m 39s
    After completing this video, you will be able to outline expectations for privacy when using social networking sites. FREE ACCESS
  • Locked
    4.  Email Privacy
    7m 31s
    Upon completion of this video, you will be able to outline expectations for privacy when using email. FREE ACCESS
  • Locked
    5.  File Sharing Privacy
    7m 12s
    After completing this video, you will be able to outline expectations for privacy when sharing files. FREE ACCESS
  • Locked
    6.  Instant Messaging Privacy
    5m 7s
    Upon completion of this video, you will be able to outline expectations for privacy when using instant messaging. FREE ACCESS
  • Locked
    7.  Software Privacy
    6m 55s
    After completing this video, you will be able to outline expectations for privacy when using software, including desktop and mobile applications. FREE ACCESS
  • Locked
    8.  Network Privacy
    4m 48s
    Upon completion of this video, you will be able to outline expectations for privacy when using computer networks. FREE ACCESS
  • Locked
    9.  Security and Privacy Policies and Procedures
    6m 2s
    Upon completion of this video, you will be able to identify common methods for establishing and using security and privacy policies. FREE ACCESS
  • Locked
    10.  Handling Information
    6m 31s
    After completing this video, you will be able to outline regulations protecting private information and common methods for handling confidential information. FREE ACCESS
  • Locked
    11.  Password Best Practices
    8m 28s
    Upon completion of this video, you will be able to identify best practices for enforcing password policy. FREE ACCESS
  • Locked
    12.  Introduction to Encryption
    6m 42s
    After completing this video, you will be able to provide an overview of computer encryption, its basic functionality, and why it is needed. FREE ACCESS
  • Locked
    13.  Data at Rest
    5m 40s
    Upon completion of this video, you will be able to provide an overview of data at rest and how it can be protected by encryption. FREE ACCESS
  • Locked
    14.  Data in Transit
    8m 29s
    After completing this video, you will be able to provide an overview of data in transit and how it can be protected by encryption. FREE ACCESS
  • Locked
    15.  Course Summary
    44s
    In this video, we will summarize the key concepts covered in this course. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.8 of 52 users Rating 4.8 of 52 users (52)
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
Rating 4.7 of 51 users Rating 4.7 of 51 users (51)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.7 of 114 users Rating 4.7 of 114 users (114)
Rating 4.8 of 66 users Rating 4.8 of 66 users (66)
Rating 4.6 of 17 users Rating 4.6 of 17 users (17)