Monthly Archives: February 2023
4. Big Data (OBJ 1.8) In this lesson, we’re going to discuss the impact of big data on enterprise security and privacy. So what is big data? Well, big data refers to data sets that are so large or so complex that traditional data processing applications are not sufficient to handle them. This data can […]
1. Emerging Technology (OBJ 1.8) In this section of the course, we’re going to discuss some emerging technologies. Throughout this section, we’re going to be focused on domain one security architecture, and specifically objective one eight that states that you must explain the impact of emerging technologies on enterprise security and privacy. Your organization is […]
9. Data Loss Detection (OBJ 1.4) In this lesson, we’re going to discuss data loss detection techniques that you can use to ensure the security of our enterprise data. These techniques include watermarking, digital rights management, network traffic decryption and deep packet inspection, and network traffic analysis. These techniques are important because we can’t stop […]
7. Data Loss Prevention (DLP) (OBJ 1.4) In this lesson, we’re going to talk about data loss prevention, also known as DLP. Now, data loss prevention solutions are used to detect and prevent sensitive information from being stored on unauthorized systems or from being transmitted over unauthorized networks. Essentially, with data loss prevention systems, our […]
5. Deidentification (OBJ 1.4) In dealing with data security, it’s important to protect sensitive data and information that you collect from your users or your customers. One way to do this is use a process known as deidentification, which allows you to still maintain the data collected, but it removes the ability for your organization […]
3. Data Classification (OBJ 1.4) Data classification occurs during the data creation stage of your data lifecycle. Now, data classification is the process of applying confidentiality and privacy labels to a given piece of information. I personally find that the best way to think about this is if you think of any kind of military […]
1. Data Security (OBJ 1.4) In this section of the course, we’re going to discuss data security. Now, throughout this section, we’re going to be focused again on domain one security architecture, and specifically objective One four. Given a scenario, you must implement data security techniques for securing enterprise architecture. Now, to secure data in […]
1. Cryptography (OBJ 1.7) In this section of the course, we’re going to discuss cryptography and public key infrastructure. Throughout this section, we’re going to be focused on domain one security architecture, and specifically Objective 1. 7, which states that you must explain how cryptography and public key infrastructure, or PKI, support security objectives and […]
10. Root of Trust (OBJ 1.5) In this lesson we’re going to talk about the concept of a hardware root of trust, or rot. Now, a hardware root of trust is the foundation upon which all secure operations of a computing system are going to depend. It contains the keys used for cryptographic functions and […]
8. Authentication Protocols (OBJ 1.5) There are numerous different authentication protocols in use within our enterprise networks. This includes radius cactus plus diameter. LDAP kerberos eight, two, one, x and EAP. First. We have the radius protocol. The Remote Authentication Dialing User Service Protocol is a network protocol that’s used to authenticate users, authorize them […]