MyPage is a personalized page based on your interests.The page is customized to help you to find content that matters you the most.


I'm not curious

Data Wiping and Destruction

Course Summary

An introductory course about understanding data wiping and destruction, data erasure and data sanitization.


  • +

    Course Syllabus

    • Overview of Data Security and Information Sensitivity
      • Introduction and Objectives
      • Introduction to Data Security
      • Information Security
      • Information Sensitivity
      • Non-Sensitive Information
      • Types of Sensitive Information
      • Identity Theft
      • Data Leaks
      • File Deletion
      • Undeletion
      • Section 1 - Quiz
      • Reading Assignment Section 1
    • Data Erasure
      • Introduction and Objectives
      • Introduction to Data Erasure
      • Where is Data Located?
      • Understanding File Deletion
      • Importance of Data Erasure
      • Reasons for Data Erasure
      • Data Wiping vs Erasing
      • Limitations of Erasing
      • Benefits of Data Erasure
      • Data Breach
      • Section 2 - Quiz
      • Reading Assignment Section 2
    • Data Sanitization
      • Introduction and Objectives
      • Introduction to Data Sanitization
      • Data Sanitization Methods
      • Best Method
      • What Files are Erased, Benefits and Features
      • Self Destruct
      • Remote Data Deletion
      • Section 3 - Quiz
      • Reading Assignment Section 3
    • Data Sanitization Methods
      • Introduction and Objectives
      • Introduction to Data Sanitization Method
      • Secure Erase
      • DoD 5220.22-M data sanitization method
      • NCSC-TG-025 sanitization method
      • AFSSI-5020 sanitization method
      • AR 380-19 sanitization method
      • NAVSO P-5239-26 sanitization method
      • RCMP TSSIT OPS-II data sanitization method
      • CSEC ITSG-06 sanitization method
      • HMG IS5 sanitization method
      • ISM 6.2.92 and NZSIT 402
      • Verschlusssache IT Richtlinien
      • GOST R 50739-95 method
      • Gutmann, Schneier and Pfitzner methods
      • Random Data Sanitization Method
      • Write Zero method
      • Section 4 - Quiz
      • Reading Assignment Section 4
    • Data Remanence
      • Introduction and Objectives
      • Introduction to Data Remanence
      • History of Data Remanence
      • Causes of Data Remanence
      • Problem with Data Remanence
      • Avoiding Data Remanence Attacks in SRAM
      • Counter Measures
      • Standards
      • Section 5 - Quiz
      • Reading Assignment Section 5
    • Data Destruction
      • Introduction and Objectives
      • Introduction to Data Destruction
      • Introduction to the Methods of Data Destruction
      • Delete / Format
      • Degaussing
      • Physical Destruction
      • Software Overwrite
      • Dead Storage
      • Importance of Data Destruction
      • Section 6 - Quiz
      • Reading Assignment Section 6
    • Erasure of Different Types of Media
      • Introduction and Objectives
      • Computer Hard Drive
      • Printer Hard Drive
      • USB and Other Flash Media
      • Flash Hard Drive
      • Zip, Jaz and Rev Disks
      • Section 7 - Quiz
      • Reading Assignment Section 7
    • Course Resources
      • Data Wiping and Destruction Complete Certification Kit Book
      • Data Wiping and Destruction Glossary of Terms
      • Quiz Answer Sheet
    • Data Wiping and Destruction Certification
      • Final Exam
      • Evaluation Form
      • Conclusion - Final Lecture


Course Fee:
USD 149

Course Type:

Self-Study

Course Status:

Active

Workload:

1 - 4 hours / week

Attended this course?

Back to Top

Awards & Accolades for MyTechLogy
Winner of
REDHERRING
Top 100 Asia
Finalist at SiTF Awards 2014 under the category Best Social & Community Product
Finalist at HR Vendor of the Year 2015 Awards under the category Best Learning Management System
Finalist at HR Vendor of the Year 2015 Awards under the category Best Talent Management Software
Hidden Image Url

Back to Top