Books & Videos

Table of Contents

Chapter: Asset Security - Introduction

Introduction

02m 18s

Chapter: The Information Lifecycle

Information Lifecycle

09m 38s

Information Assets

08m 26s

Location Of Information Assets

08m 23s

Access Control And CIA

10m 13s

CIA

02m 24s

Chapter: Roles And Responsibilities

Senior Management

06m 40s

Security Professional

06m 0s

Data Owner, System Custodian, And User

08m 25s

Third Party Service Providers

06m 45s

Chapter: Data Classification

Data Classification - Part 1

06m 13s

Data Classification - Part 2

06m 57s

The Data Classification Process

08m 34s

Inventory

07m 6s

Asset Value And Criteria

08m 49s

Protections

06m 35s

Labeling

06m 39s

Technologies

09m 30s

Monitoring And Training

07m 31s

Chapter: Data Retention

Data Retention - Part 1

09m 47s

Data Retention - Part 2

04m 30s

Chapter: Security Controls

ATP - Part 1

10m 15s

ATP - Part 2

06m 58s

ATP - Part 3

12m 17s

Baselines - Part 1

07m 43s

Baselines - Part 2

11m 8s

Baselines - Part 3

03m 44s

Configuration Management - Part 1

08m 41s

Configuration Management - Part 2

08m 42s

Configuration Management - Part 3

09m 49s

Data And Media Handling

08m 8s

Data Remanence

08m 31s

Secure Deletion - Part 1

06m 37s

Secure Deletion - Part 2

09m 0s

Chapter: Wrap Up

Conclusion

04m 41s