CompTIA Security+: Risk Management, Privacy, & Sensitive Data Security

CompTIA    |    Intermediate
  • 12 videos | 40m 48s
  • Includes Assessment
  • Earns a Badge
Rating 3.5 of 302 users Rating 3.5 of 302 users (302)
In this CompTIA Security+ SY0-601 course, you'll explore some advanced security concepts and build on some you may already know. The main topics you'll examine are risk management, privacy issues, and sensitive data management. You'll start by recognizing the essential aspects and considerations of risk types, risk management strategies, risk analysis, and disasters. You'll then review the business impact analysis (BIA) aspect of business continuity planning. Moving on to sensitive data security, you'll identify privacy breach consequences, data classification types, and associated roles and responsibilities. You'll also outline privacy protection measures, such as notifications of privacy breaches, privacy-enhancing technologies, and advanced privacy concepts, like impact assessments and privacy notices. This course is part of a series that prepares you for the CompTIA Security+ (SY0-601) exam.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Compare risk types, such as internal, external, and multiparty
    Describe risk management strategies, like acceptance, avoidance, transference, and mitigation
    Define risk analysis terms, as in risk register, inherent risk, residual risk, and control risk
    List disasters and classify their types, such as environmental, human-made, and external
    Describe business impact analysis concepts, like recovery time vs. recovery point objectives, mean time to repair, and mean time between failures, and outline a disaster recovery plan
  • Explore the consequences of breaches, such as fines and identity theft
    Define various data type classifications, like public, sensitive, and critical
    Compare different roles and responsibilities, as in data owners, controllers, processors, custodians, and stewards
    Describe privacy-enhancing technologies, such as tokenization, data minimization and masking, and anonymization
    Explore privacy concepts, like information's life cycle, impact assessment, terms of agreement, and privacy notices
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 1m 46s
  • 5m 32s
    In this video, find out how to compare types of risk, such as internal, external, and multiparty. FREE ACCESS
  • Locked
    3.  Risk Management Strategies
    2m 25s
    Upon completion of this video, you will be able to describe risk management strategies, like acceptance, avoidance, transference, and mitigation. FREE ACCESS
  • Locked
    4.  Risk Analysis
    8m 52s
    In this video, you will define risk analysis terms, such as risk register, inherent risk, residual risk, and control risk. FREE ACCESS
  • Locked
    5.  Disaster Types and Classifications
    2m 27s
    After completing this video, you will be able to list disasters and classify their types, such as environmental, human-made, and natural. FREE ACCESS
  • Locked
    6.  Business Impact Analysis
    4m 4s
    Upon completion of this video, you will be able to describe business impact analysis concepts, like recovery time vs. recovery point objectives, mean time to repair, and mean time between failures, and outline a disaster recovery plan. FREE ACCESS
  • Locked
    7.  Privacy Breach Consequences
    3m 20s
    Find out how to explore the consequences of breaches, such as fines and identity theft. FREE ACCESS
  • Locked
    8.  Data Type Classification
    2m 47s
    In this video, learn how to define various data type classifications, like public, sensitive, and critical. FREE ACCESS
  • Locked
    9.  Data Security Roles and Responsibilities
    2m 32s
    During this video, you will learn how to compare different roles and responsibilities, such as data owners, controllers, processors, custodians, and stewards. FREE ACCESS
  • Locked
    10.  Privacy Enhancing Technologies
    2m 32s
    Upon completion of this video, you will be able to describe privacy-enhancing technologies, such as tokenization, data minimization, masking, and anonymization. FREE ACCESS
  • Locked
    11.  Additional Privacy Concepts
    3m 51s
    During this video, you will learn how to explore privacy concepts, like the life cycle of information, impact assessment, terms of agreement, and privacy notices. FREE ACCESS
  • Locked
    12.  Course Summary
    40s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.6 of 80 users Rating 4.6 of 80 users (80)
Rating 4.4 of 5 users Rating 4.4 of 5 users (5)
Rating 4.4 of 64 users Rating 4.4 of 64 users (64)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.3 of 94 users Rating 4.3 of 94 users (94)
Rating 4.4 of 114 users Rating 4.4 of 114 users (114)
Rating 4.5 of 193 users Rating 4.5 of 193 users (193)