Description
In this module, you will learn about Data Life Cycle Requirements, Data Retention Steps, Software Decommissioning Requirements, Software Decommissioning Lifecycle, Decommissioning Software, End-Of -Life Policies Process, End-Of -Life Policies Components, Credential Removal, Configuration Removal, License Cancellation, Data Archiving, Media Sanitization, Data Remanence, Overwriting Data, Degaussing Data, Hard Disk Drive Data, Solid State Drive Data, Cryptographic Erase, Clearing and Purging, and Defensible Destruction.
Risk Management Framework Fundamentals
Physical Site Design
Security Controls
NIST Security and Privacy Controls
Introduction to Risk




