User Habits – CompTIA Security+ SY0-401: 2.6
How are your users handling the organization’s data? In this video, you’ll learn some techniques for maintaining good data hygiene for your entire user base.
How are your users handling the organization’s data? In this video, you’ll learn some techniques for maintaining good data hygiene for your entire user base.
The data in our organization may fall under some very important compliance regulations. In this video, you’ll learn about SOX, HIPAA, and GLBA compliance requirements.
What happens when you need to get rid of data? In this video, you’ll find that the handling and disposal of data can be a relatively complex issue.
Not all data has the same level of classification. In this video, you’ll learn about some common data classifications such as unclassified, confidential, and secret.
Nearly all security incidents will incur some level of damage or loss of data. In this video, you’ll learn how to limit the spread of the damage.
Nobody likes their data to leave the network, but sometimes data breaches occur. In this video, you’ll learn how to secure and analyze the attack after a data breach has occurred.
The first responder to a security incident has a number of important responsibilities. In this video, you’ll learn the roles of the first responder to a security event.
When the security event has concluded, it’s time to rebuild any damaged sections of the network. In this video, you’ll learn some strategies for getting back up and running as quickly as possible.
What’s the best way to gather information during a security incident? In this video, you’ll learn some techniques for gathering details and how to report after the security event is over.
After an incident has occurred, it’s important to compare notes and plan for the next attack. In this video, you’ll learn how to answer the tough questions about a security incident.