Udemy - Data Security Fundamentals
- Category Other
- Type Tutorials
- Language English
- Total size 1.7 GB
- Uploaded By freecoursewb
- Downloads 221
- Last checked 2 days ago
- Date uploaded 7 months ago
- Seeders 11
- Leechers 5
Infohash : 5263FFFC5EBD40AAA1B08FE8ABF674BD9D0CA8EE
Data Security Fundamentals
https://WebToolTip.com
Published 5/2025
Created by George Smarts
MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch
Level: Beginner | Genre: eLearning | Language: English | Duration: 81 Lectures ( 3h 48m ) | Size: 1.66 GB
Master Data Security: Protect Information, Prevent Breaches, and Safeguard Your Digital Assets
What you'll learn
Understand the Fundamentals of Data Security
Identify Common Threats and Vulnerabilities
Implement Data Protection Best Practices
Comply with Legal and Regulatory Requirements
Develop and Enforce Security Policies
Respond to Data Breaches and Incidents
Utilize Security Tools and Technologies
Promote a Security-First Culture
Requirements
No specific data security knowledge requirements. We will start from the basics.
Files:
[ WebToolTip.com ] Udemy - Data Security Fundamentals- Get Bonus Downloads Here.url (0.2 KB) ~Get Your Files Here ! 1 - Introduction
- 1 -Introduction.mp4 (27.4 MB)
- 2 -Data Security Masterclass.pdf (72.8 MB)
- 2 -Download the course materials.mp4 (8.0 MB)
- 1 -Security Monitoring and Logging.mp4 (22.4 MB)
- 2 -Incident Detection.mp4 (21.4 MB)
- 3 -Incident Response Plan for Data Security.docx (19.1 KB)
- 3 -Incident Response Planning.mp4 (31.0 MB)
- 4 -Digital Forensics Fundamentals.mp4 (36.6 MB)
- 5 -Business Continuity.mp4 (26.8 MB)
- 6 -Data Disaster Recovery.mp4 (60.5 MB)
- 1 -Social Engineering Attacks.mp4 (16.5 MB)
- 2 -Developing Security Awareness Programs.mp4 (24.5 MB)
- 2 -Security_Awareness_Program_Template.xlsx (10.1 KB)
- 3 -Measuring Security Awareness.mp4 (28.2 MB)
- 4 -Creating a Security-Aware Culture.mp4 (35.0 MB)
- 1 -General Data Protection Regulation (GDPR).mp4 (19.4 MB)
- 2 -Health Insurance Portability and Accountability Act (HIPAA).mp4 (10.0 MB)
- 3 -California Consumer Privacy Act (CCPA) & California Privacy Rights Act (CPRA).mp4 (21.7 MB)
- 4 -Indiaβs Digital Personal Data Protection Act (DPDP).mp4 (12.9 MB)
- 5 -Regional and Sector-Specific Laws.mp4 (21.2 MB)
- 1 -Intro to Data Security Standards.mp4 (27.2 MB)
- 2 -ISO 27001.url (0.1 KB)
- 2 -ISOIEC 27001.mp4 (21.1 MB)
- 3 -NIST SP 800-53.mp4 (11.8 MB)
- 3 -NIST SP 800-53.url (0.1 KB)
- 4 -PCI DSS.url (0.1 KB)
- 4 -Payment Card Industry Data Security Standard (PCI DSS).mp4 (13.8 MB)
- 5 -SOC 2 (Service Organization Control 2).mp4 (22.3 MB)
- 5 -SOC 2.url (0.1 KB)
- 1 -Data Security Certifications.xlsx (13.1 KB)
- 1 -Which Data Security Certification to pursue - how to choose.mp4 (18.9 MB)
- 10 -HealthCare Information Security and Privacy Practitioner (HCISPP).mp4 (9.4 MB)
- 11 -GDPR - Certified Data Protection Officer (CDPO).mp4 (10.0 MB)
- 2 -Certified Information Systems Security Professional (CISSP).mp4 (12.0 MB)
- 3 -Certified Information Security Manager (CISM).mp4 (6.1 MB)
- 4 -Certified Information Systems Auditor (CISA).mp4 (7.5 MB)
- 5 -Certified Ethical Hacker (CEH).mp4 (7.4 MB)
- 6 -CompTIA Security+.mp4 (8.7 MB)
- 7 -Certified Cloud Security Professional (CCSP).mp4 (9.8 MB)
- 8 -Offensive Security Certified Professional (OSCP).mp4 (8.1 MB)
- 9 -Certified Information Privacy Technologist (CIPT).mp4 (8.1 MB)
- 1 -Next Steps.mp4 (8.2 MB)
- 2 - Bonus Lecture.html (4.4 KB)
- 1 -What is Data Security.mp4 (19.9 MB)
- 2 -Importance of Data Protection - real examples.mp4 (51.0 MB)
- 3 -Types of sensitive data to be protected.mp4 (17.5 MB)
- 4 -The CIA Triad Confidentiality, Integrity and Availability.mp4 (18.5 MB)
- 5 -Data states at rest, in transit, in processing.mp4 (30.7 MB)
- 1 -Phishing Poster - for printing.pdf (64.3 KB)
- 1 -Phishing.mp4 (22.1 MB)
- 10 -Denial of Service (DoS) & Distributed DoS (DDoS) Attacks.mp4 (23.2 MB)
- 11 -Insecure APIs & Third-party integrations.mp4 (16.3 MB)
- 12 -Physical Security Breaches.mp4 (11.3 MB)
- 13 -AI-based Attacks.mp4 (42.9 MB)
- 14 -Zero-Day Vulnerabilities.mp4 (19.5 MB)
- 2 -Phishing email example identifying a phishing email.mp4 (20.8 MB)
- 3 -Malware.mp4 (26.2 MB)
- 4 -Ransomware article to read with 11 famous examples.url (0.1 KB)
- 4 -Ransomware.mp4 (20.1 MB)
- 5 -Insider Threats.mp4 (13.2 MB)
- 6 -Weak Passwords & Credential Theft.mp4 (12.6 MB)
- 7 -Unpatched Software Vulnerabilities.mp4 (11.1 MB)
- 8 -Data Leakage & Accidental Exposure.mp4 (22.8 MB)
- 9 -Man-in-the-Middle (MitM) Attacks.mp4 (12.3 MB)
- 1 -Data Security Policy.docx (30.2 KB)
- 1 -Data Security Policy.mp4 (46.8 MB)
- 2 -Data Classification Policy.docx (112.0 KB)
- 2 -Data Classification Policy.mp4 (35.4 MB)
- 3 -Data Security Risk Register.mp4 (48.7 MB)
- 3 -Risk Register.xlsx (14.0 KB)
- 4 -Data Retention Policy.docx (37.7 KB)
- 4 -Data Retention Policy.mp4 (26.8 MB)
- 1 -Data Classification Exercise.xlsx (11.7 KB)
- 1 -Exercise Classify different types of organizational data.mp4 (18.8 MB)
- 2 -Data Classification Exercise_Solution.xlsx (12.0 KB)
- 2 -Solution Classify different types of organizational data.mp4 (29.8 MB)
- 1 -Cryptography 101.url (0.1 KB)
- 1 -Principles of Cryptography.mp4 (23.4 MB)
- 2 -IBM guide on Symmetric Encryption.url (0.1 KB)
- 2 -Symmetric Encryption.mp4 (21.8 MB)
- 3 -Hands-On exercise Let's do symmetric encryption on a message.mp4 (17.2 MB)
- 3 -Online encryption tool.url (0.0 KB)
- 4 -Asymmetric Encryption.mp4 (14.1 MB)
- 4 -IBM guide on Asymmetric Encryption.url (0.1 KB)
- 5 -Asymmetric encryption online tool.url (0.1 KB)
- 5 -Hands-On exercise Let's do asymmetric encryption on a message.mp4 (16.0 MB)
- 6 -Hashing 101.url (0.1 KB)
- 6 -Hashing for Data Integrity.mp4 (15.6 MB)
- 7 -Hands-On exercise Let's hash a password.mp4 (12.6 MB)
- 7 -Hashing tool.url (0.1 KB)
- 1 -What is Identity and Access Management (IAM).mp4 (18.4 MB)
- 2 -IAM Principles.mp4 (19.3 MB)
- 2 -Identity and Access Management.docx (18.5 KB)
- 3 -Authentication Methods.mp4 (12.1 MB)
- 4 -Authorization and Access Control Models.mp4 (17.2 MB)
- 5 -Detailed Guide on PAM.url (0.1 KB)
- 5 -Privileged Access Management (PAM).mp4 (25.7 MB)
- 1 -Secure Software Development Lifecycle (SSDLC).url (0.1 KB)
- 1 -Security in the SDLC.mp4 (14.6 MB)
- 2 -Secure Coding Principles Checklist.url (0.1 KB)
- 2 -Secure Coding Principles.mp4 (15.8 MB)
- 3 -API Security 101 article.url (0.1 KB)
- 3 -API Security Basics.mp4 (7.9 MB)
- 4 -Automated Security Testing article.url (0.1 KB)
- 4 -Automated Security Testing.mp4 (7.4 MB)
- 5 -DevSecOps Principles article.url (0.1 KB)
- 5 -DevSecOps Principles.mp4 (17.4 MB)
- 1 -Introduction to Data Loss Prevention (DLP).mp4 (14.0 MB)
- 2 -Key Components of a DLP Solution.mp4 (49.3 MB)
- 3 -Data Loss Prevention Policy - template included for download.mp4 (27.7 MB)
- 3 -Data Loss Prevention Policy.docx (27.1 KB)
- 4 -Types of DLP and Implementation Considerations.mp4 (15.8 MB)
- Bonus Resources.txt (0.1 KB)
There are currently no comments. Feel free to leave one :)
Code:
- udp://tracker.torrent.eu.org:451/announce
- udp://tracker.tiny-vps.com:6969/announce
- http://tracker.foreverpirates.co:80/announce
- udp://tracker.cyberia.is:6969/announce
- udp://exodus.desync.com:6969/announce
- udp://explodie.org:6969/announce
- udp://tracker.opentrackr.org:1337/announce
- udp://9.rarbg.to:2780/announce
- udp://tracker.internetwarriors.net:1337/announce
- udp://ipv4.tracker.harry.lu:80/announce
- udp://open.stealth.si:80/announce
- udp://9.rarbg.to:2900/announce
- udp://9.rarbg.me:2720/announce
- udp://opentor.org:2710/announce