Description
In this module, you will learn about how to Identify and classify information and assets, Data states, Data at rest, Data in motion, Data in use, Determine data security controls, Determine data security compliance requirements, Establish information and asset handling requirements, Ensure appropriate asset retention, End-of-Life. End-of-Support, Information and asset ownership, Asset inventory, Provision resources securely, Tangible assets. Intangible assets, Asset management, Data protection methods, Digital Rights Management, Data Loss Prevention, and Cloud Access Security Broker.