Data Protection Strategies
Welcome to the Data Protection Strategies Practice Lab. In this module, you will be provided with the instructions and devices needed to develop your hands-on skills.
Data protection strategies are implemented to protect the confidentiality, integrity, and availability of production data. These strategies are implemented through risk management to protect the data from cyber threats, maintain customer trust, and comply with laws and regulations.
In this module, you will explore the data protection strategies of encryption, hashing, and code obfuscation.
Overview
Learning Outcomes:
In this module, you will complete the following exercises:
- Exercise 1 - Encryption
- Exercise 2 - Hashing
- Exercise 3 - Obfuscation
After completing this module, you should be able to:
- Encrypt a file.
- Encrypt a folder.
- Conduct hashing in Windows.
- Conduct hashing in Linux.
- Execute JavaScript code.
- Obfuscate and execute JavaScript code.
Exam Objectives:
The following exam objective is covered in this module:
3.3 Compare and contrast concepts and strategies to protect data
- General data considerations
- Methods to secure data