CCSP 2019: Data Security Technologies
CCSP
| Intermediate
- 12 videos | 36m 3s
- Includes Assessment
- Earns a Badge
Responsibility for managing data falls on the cloud customer. In this 7-video course, learners explore data storage, threats, and security mitigations to help ensure data protection. Examine security techniques such as hashing, data masking, data tokenization, and data loss prevention. This course can be used in preparation for the (ISC)2 Certified Cloud Security Professional (CCSP) exam. Begin by looking at various technologies associated with data asset security and protection. Examine Amazon Web Services storage types including long-term, ephemeral, and raw-disk. Learn how to differentiate between data owner and data custodian, including risk profile, risk appetite, and responsibility. Look at potential threats associated with storage types including ISO/IEC 27040. Learn about encryption for Microsoft Azure virtual machine disks, and about key management, which involves creating an Azure Key Vault and key. Discover how to generate files hashes using Microsoft PowerShell. Look at data masking, or enabling Microsoft Azure SQL Database dynamic masking (obfuscation), and data tokenization technologies. Finally, learn about data loss prevention by configuring Microsoft Azure Information Protection.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseDefine the various technologies associated with data asset security and protectionDescribe amazon web services storage types including long term, ephemeral, and raw-diskDifferentiate between data owner and data custodian, including risk profile, risk appetite, and responsibilityDescribe potential threats associated with storage types including iso/iec 27040Enable encryption for microsoft azure virtual machine disks
-
Create a microsoft azure key vault and keyGenerate file hashes using microsoft powershellEnable microsoft azure sql database dynamic masking (obfuscation)Describe data tokenization technologiesConfigure microsoft azure information protectionSummarize the key concepts covered in this course
IN THIS COURSE
-
2m 8s
-
3m 1sDuring this video, you will learn how to define the various technologies associated with data asset security and protection. FREE ACCESS
-
4m 6sAfter completing this video, you will be able to describe Amazon Web Services storage types including long-term, ephemeral, and raw-disk. FREE ACCESS
-
2m 19sIn this video, learn how to differentiate between data owner and data custodian, including risk profile, risk appetite, and responsibility. FREE ACCESS
-
4m 16sUpon completion of this video, you will be able to describe potential threats associated with storage types including ISO/IEC 27040. FREE ACCESS
-
5m 15sIn this video, you will enable encryption for disks on Microsoft Azure virtual machines. FREE ACCESS
-
3m 44sDuring this video, you will learn how to create a Microsoft Azure Key Vault and a key. FREE ACCESS
-
2m 49sIn this video, learn how to generate file hashes using Microsoft PowerShell. FREE ACCESS
-
2m 20sDuring this video, you will learn how to enable Microsoft Azure SQL Database dynamic masking. FREE ACCESS
-
2m 32sUpon completion of this video, you will be able to describe data tokenization technologies. FREE ACCESS
-
2m 39sIn this video, learn how to configure Microsoft Azure Information Protection. FREE ACCESS
-
56s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.