Security for Engineering Leaders: Data Security for Engineering Projects

Security    |    Intermediate
  • 18 videos | 1h 6m 43s
  • Includes Assessment
  • Earns a Badge
Rating 4.3 of 106 users Rating 4.3 of 106 users (106)
Understanding the who, where, and what is important for good outcomes when it comes to data security. Through this course, explore a breakdown of data security challenges and best practices, and how to use your knowledge of them like tools in a toolbox. Discover data security challenges that occur with teams, data, and projects, examine data security in the cloud and in data centers, learn about project data sets, and explore team expertise levels and other elements of a team before, during, and after a project. After course completion, you'll be able to apply a better understanding of data security challenges and best practices for teams and projects.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Identify challenges and best practices around who works with data
    State challenges and best practices around data security and team management
    Outline challenges and best practices around the management of data that is in motion, at rest, or in use
    Identify challenges and best practices around project workflow methods
    State challenges and best practices around the different places data can be
    Outline challenges and best practices around data security and the cloud
    Discern differences and similarities in aws, azure, and kubernetes
    Identify data security challenges around confidentiality, integrity, and availability
  • Outline how data is secured in a data center
    Describe best practices for data security in collaborative workspaces including using boards and repositories
    Apply data security best practices in the test bed including isolating assets and using disposable assets
    Identify challenges and best practices around data sets, expertise levels, and outcomes
    State best practices around data sets including security, classification, and stewardship
    Consider different data security team options including dedicated, cross-organizational, and mixed teams
    Describe security awareness practices in teams including clarity of scope, clear communications, and general security awareness
    Discuss the importance of benchmarks and scope fulfillment
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 40s
    In this video, we will discover the key concepts covered in this course. FREE ACCESS
  • 5m 24s
    Upon completion of this video, you will be able to identify challenges and best practices around who works with data. FREE ACCESS
  • Locked
    3.  Data Security: Team Challenges
    3m 41s
    In this video, you will state challenges and best practices around data security and team management. FREE ACCESS
  • Locked
    4.  Data Security: Data Challenges
    4m 59s
    After completing this video, you will be able to outline challenges and best practices around the management of data that is in motion, at rest, or in use. FREE ACCESS
  • Locked
    5.  Data Security: Project Challenges
    4m 8s
    During this video, you will learn how to identify challenges and best practices around project workflow methods. FREE ACCESS
  • Locked
    6.  The Where of Data Security
    7m 3s
    In this video, you will learn how to state challenges and best practices around the different places data can be. FREE ACCESS
  • Locked
    7.  Data Security in the Cloud
    4m 43s
    During this video, discover how to outline challenges and best practices around data security and the cloud. FREE ACCESS
  • Locked
    8.  Frameworks for Data Security
    4m 49s
    Learn how to discern differences and similarities in AWS, Azure, and Kubernetes. FREE ACCESS
  • Locked
    9.  Data Security Challenges
    5m 9s
    In this video, you will learn how to identify data security challenges around confidentiality, integrity, and availability. FREE ACCESS
  • Locked
    10.  How Data is Secured in a Data Center
    3m 31s
    Find out how to outline how data is secured in a data center. FREE ACCESS
  • Locked
    11.  Data Security in Collaborative Workspaces
    4m 13s
    In this video, learn how to describe best practices for data security in collaborative workspaces including using boards and repositories. FREE ACCESS
  • Locked
    12.  Data Security in the Test Bed
    2m 59s
    During this video, discover how to apply data security best practices in the test bed including isolating assets and using disposable assets. FREE ACCESS
  • Locked
    13.  The What of Data Security
    3m 22s
    In this video, discover how to identify challenges and best practices around data sets, expertise levels, and outcomes . FREE ACCESS
  • Locked
    14.  Project Data Sets
    2m 58s
    Discover how to state best practices around data sets including security, classification, and stewardship . FREE ACCESS
  • Locked
    15.  Data Security Team Options
    3m 10s
    In this video, you will consider different data security team options including dedicated, cross-organizational, and mixed teams. FREE ACCESS
  • Locked
    16.  Team Expectations and Understandings
    2m 56s
    Upon completion of this video, you will be able to describe security awareness practices in teams including clarity of scope, clear communications, and general security awareness. FREE ACCESS
  • Locked
    17.  Expected Project Outcomes
    1m 53s
    After completing this video, you will be able to discuss the importance of benchmarks and scope fulfillment. FREE ACCESS
  • Locked
    18.  Course Summary
    1m 8s
    In this video, we will summarize the key concepts covered in this course. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.2 of 89 users Rating 4.2 of 89 users (89)
Rating 4.4 of 200 users Rating 4.4 of 200 users (200)
Rating 4.4 of 5 users Rating 4.4 of 5 users (5)