Security Awareness: Portable Data Protection and Destruction

In this mobile society, you need your data to be available with you wherever you go. This might include data from your company or your own personal data. Learn how to identify and protect this data from the prying eyes of a cybercriminal.
Course info
Rating
(10)
Level
Beginner
Updated
Jan 15, 2018
Duration
59m
Table of contents
Description
Course info
Rating
(10)
Level
Beginner
Updated
Jan 15, 2018
Duration
59m
Description

There are numerous pieces of information about you or your company that are confidential, and how you transport and protect your data plays a big role in its security. In this course, Security Awareness: Portable Data Protection and Destruction, you'll learn how to protect and destroy your portable data when necessary. First, you'll explore how to identify malicious attacks and how to stop from becoming a victim of those attacks. Next, you'll discover how to be more proactive in avoiding this type of attack. Finally, you'll delve into the safest ways to destroy your data when it's needed. When you're finished with this course, you'll have the required skills and knowledge of security awareness to both protect and destroy your portable data.

About the author
About the author

Jason Helmick is an author for Pluralsight. His IT career spans more than 25 years or enterprise consulting on a variety of technologies, with a focus on strategic IT business planning. He’s a highly successful IT author, columnist, lecturer, and instructor, specializing in automation practices for the IT pro.

More from the author
More courses by Jason Helmick
Section Introduction Transcripts
Section Introduction Transcripts

Course Overview
Hi, I'm Jason Helmick, an author here at Pluralsight, and welcome to my course, Portable Data Protection and Destruction. You know in our mobile society today, we need our data to be available with us wherever we go. This might include data from our company, customer information, and our own personal data, but there are numerous pieces of information about you or your company that is confidential. Even something so simple as meeting notes or an email exchange can contain sensitive material, so it's important to identify and protect this data from the prying eyes of a cybercriminal. How you transport and protect your data plays a big role in its security. So in this course, you will learn how to protect your portable data with gaining knowledge of malicious attacks, learn to identify those attacks, and how to stop from falling victim. You'll also learn how to be more proactive in avoiding this type of attack. So join me on this journey to start learning about cybersecurity and portable data protection and destruction. Here at Pluralsight we love learning, and we hope that you do too.