Review of the major Asset Classification concepts and terms, and how they interrelate, to help you review, guide your studies, and help you pass the CISSP exam.

This MindMap covers:

0:00 Introduction
0:30 Asset Classification/Data Classification
1:02 Asset Inventory
1:45 Data Classification Policy
2:22 Classification
2:50 Labeling
3:09 Marking
3:22 Categorization
3:47 Data Owner/Controller
4:03 Data Processor
4:18 Data Custodian
4:35 Data Steward
4:55 Data Subject
5:13 Protecting Data at Rest
5:17 Encryption
5:37 Access Control
5:55 Backups
6:06 Protecting Data in Motion
6:22 End-to-End Encryption
7:08 Link Encryption
7:51 Onion Networks
9:11 Data in Use
9:38 Data Archive
10:05 Defensible Destruction of Data
10:36 Destruction of Data
10:48 Purging of Data
11:00 Clearing of Data
11:13 Media Destruction
11:28 Shred/Disintegrate/Drill
11:41 Degaussing
11:59 Crypto Shredding
12:35 Overwriting/Wiping/ Erasure
13:03 Formatting
13:17 Best to Worst Data Destruction Methods
13:23 Assess and Review
13:51 Outro

Other MindMaps:

Domain 1
Security & Risk Management: https://youtu.be/geGALIfOxtI

Domain 2
Asset Classification: https://youtu.be/aN9zkmzYTmQ
Privacy: https://youtu.be/lrI4QIa8S2I

Domain 3
Models and Frameworks: https://youtu.be/qZB6_lp9M30
Evaluation Criteria: https://youtu.be/WqHmDL7YAvw
Trusted Computing Base: https://youtu.be/fwU7n_3h058
Vulnerabilities in Systems: https://youtu.be/fPUypU7ysMw
Cloud: https://youtu.be/-rWQ7YuxiLY
Cryptography: https://youtu.be/LLRaa0kOMDM
Digital Certificates, Digital Signatures & PKI: https://youtu.be/8XKdFSG3ua4
Cryptanalysis: https://youtu.be/pnITDgs63M4
Physical Security: https://youtu.be/7ESQwNJ9HXU

Domain 5
Access Control Overview: https://youtu.be/BUcoABZzeQ4
Single Sing-on & Federated Access: https://youtu.be/_U4QMIxVk8M

Domain 6
Security Assessment and Testing Overview: https://youtu.be/eDVZvw5NziA
Vulnerability Assessment and Penetration Testing: https://youtu.be/vZ0S8GdWiIk
Logging & Monitoring: https://youtu.be/cwcARccyWyY

Domain 7
Investigations: https://youtu.be/Urev5cZgny8
Incident Response: https://youtu.be/PwxFwndQ7Jk
Malware: https://youtu.be/SVbrRozyIpo
Patching & Change Management: https://youtu.be/xX4U6Lz82Bk
Recovery Strategies: https://youtu.be/DrrfrJBnx28
Business Continuity Management (BCM): https://youtu.be/oAjNL3I_3-E

Domain 8
Secure Software Development: https://youtu.be/fS5WWjuyFmQ
Databases: https://youtu.be/-70DBd6cNDw

CISSP Master Instructor, John Berti: https://www.linkedin.com/in/jberti/
Visuals, narration and CISSP Master Instructor, Rob Witcher: https://www.linkedin.com/in/robwitcher/
Video editing by Nick: [email protected]