Boost your career with this complete Data Wiping and Destruction eLearning course

The Data Wiping and Destruction Complete Certification Kit is the most complete guide for anyone looking to gain an understanding of Data Wiping and Destruction and its practical application in an IT and Non-IT environment.

This course would be beneficial to recent graduates looking to get a foothold in the IT industry, Data Analysts looking to delete, protect, or restore business data and information, business owners wanting to learn more about data destruction and wiping techniques, and managers looking for an effective way of maintaining data security measures.

What will you get?

  • Data Wiping and Destruction Workbook

    PDF eBook to download for additional content and reference material.

  • 90 days access to Online Course

    Multimedia presentations, quizzes and exercises to gain knowledge about Data Wiping and Destruction. (You can purchase course extensions when you need more time)

  • Bonus: Certification exam

    Included in the course is the exam preparation, to make sure you pass your certification exam - which is also included in your course at no extra cost. (* Additional exam sittings can be purchased at $45.00 each)

The learning experience

The program combines presentations supported by trainer audio. Each module is followed by quizzes and exercises (marking scheme provided) to test your knowledge and competency, and to enhance understanding of the key concepts. A certificate is awarded to your successful passing of the final exam (80% pass requirement) and completion of the course.

Course curriculum

The recommended minimum contact hours to pass the certification test is 18 hours.

    1. Data Wiping & Destruction Certification Workbook

    2. 1.1 Introduction and Objectives

    3. 1.2 Introduction to Data Security

    4. 1.3 Information Security

    5. 1.4 Information Sensitivity

    6. 1.5 Non-Sensitive Information

    7. 1.6 Types of Sensitive Information

    8. 1.7 Identity Theft

    9. 1.8 Data Leaks

    10. 1.9 File Deletion

    11. Reading Assignment

    1. 1.2 Introduction to Data Erasure

    2. 2.3 Where is Data Located

    3. 1.4 Information Sensitivity

    4. 2.4 Understanding File Deletion

    5. 2.5 Importance of Data Erasure

    6. 2.6 Reasons for Data Erasure

    7. 2.7 Data Wiping vs Erasing

    8. 2.8 Limitations of Erasing

    9. 2.9 Benefits of Data Erasure

    10. 2.10 Data Breach

    11. Reading Assignment

    12. Quiz 1

    1. 3.2 Introduction to Data Sanitization

    2. 3.3 Data Sanitization Methods

    3. 3.4 Best Method

    4. 3.5 What Files are Erased, Benefits and Features

    5. 3.6 Self Destruct

    6. 3.7 Remote Data Deletion

    7. Reading Assignment

    1. 4.2 Introduction to Data Sanitization Method

    2. 4.3 Secure Erase

    3. 4.4 DoD 5220.22-M data sanitization method

    4. 4.5 NCSC-TG-025 sanitization method

    5. 4.6 AFSSI-5020 sanitization method

    6. 4.7 AR 380-19 sanitization method

    7. 4.8 NAVSO P-5239-26 sanitization method

    8. 4.9 RCMP TSSIT OPS-II data sanitization method

    9. 4.10 CSEC ITSG-06 sanitization method

    10. 4.11 HMG IS5 sanitization method

    11. 4.12 ISM 6.2.92 and NZSIT 402

    12. 4.13 Verschlusssache IT Richtlinien

    13. 4.14 GOST R 50739-95 method

    14. 4.15 Gutmann, Schneier and Pfitzner methods

    15. 4.16 Random Data Sanitization Method

    16. 4.17 Write Zero method

    17. Reading Assignment

    18. Quiz 2

    1. 5.2 Introduction to Data Remanence

    2. 5.3 History of Data Remanence

    3. 5.4 Causes of Data Remanence

    4. 5.5 Problem with Data Remanence

    5. 5.6 Avoiding Data Remanence Attacks in SRAM

    6. 5.7 Counter Measures

    7. 5.8 Standards

    8. Reading Assignment

    1. 6.2 Introduction to Data Destruction

    2. 6.3 Introduction to the Methods of Data Destruction

    3. 6.4 Delete- Format

    4. 6.5 Degaussing

    5. 6.6 Physical Destruction

    6. 6.7 Software Overwrite

    7. 6.8 Dead Storage

    8. 6.9 Importance of Data Destruction

    9. Reading Assignment

    10. Quiz 3

About this course

  • $64.95
  • 75 lessons
  • 2 hours of video content

Pricing options

How much time do you need for this course?

Why register?

- Easy and affordable.

- Learning about Data Wiping and Destruction technologies has never been more affordable.

- Latest industry trends are explained.

- Acquire valuable skills and get updated about the industry's latest trends right here. Today.

- Learn from the Experts. The Art of Service offers education about Data Wiping and Destruction and  other technologies by the industry's best.

- Learn at your own pace. Find everything right here, when you need it, and from wherever you are.

- Sample and final exam included

 

What will you learn?

- Learn the important concepts, tools, and techniques of Data Wiping and Destruction.

- Learn about the benefits and importance of implementing Data Wiping and Destruction security measures.

- Examine data security and information sensitivity.

- Review Data Erasure and related media examples.

- Explore Data Remanence and Destruction concepts.

- Review Data Sanitization methods.

Course reviews

5 star rating

Maybe remove the word "kit"?

Francis Cuttitta

Overall it was a great course. It had way more information in it than I expected. The course pre exam and final exam were fairly tough so you need to read the workbook a few times and take the online course. Take notes.

Overall it was a great course. It had way more information in it than I expected. The course pre exam and final exam were fairly tough so you need to read the workbook a few times and take the online course. Take notes.

Read Less