CCSP 2019: Implementing Data Discovery & Classification
CCSP
| Intermediate
- 12 videos | 42m 45s
- Includes Assessment
- Earns a Badge
Proper data governance begins with labeling data and applying security controls based on those labels. Explore information rights management (IRM) and challenges associated with data discovery, as well as the roles played by PKI (public key infrastructure) security certificates and virtual private networks (VPNs) in the cloud. This 6-video course prepares learners for the (ISC)2 Certified Cloud Security Professional (CCSP) exam. Begin with IRM objectives such as data rights, provisioning, and access models. Examine data discovery approaches and techniques for structured and unstructured data, and challenges of data discovery in the cloud. Then examine data classification, enabled by using Microsoft Azure Information protection for sensitive data such as Protected Health Information (PHI) and Personally Identifiable Information (PII), and cardholder data. Recognize how PKI provides security for digital IT solutions; how to use PowerShell to create PKI certificates; and how to generate certificates in a Microsoft Azure Key Vault. Learn how VPNs are used for secure cloud resource access. Then configure a Microsoft Azure point-to-site VPN and a custom Microsoft Azure Key Vault key for storage account encryption.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseList irm objectives such as data rights, provisioning, and access modelsRecognize data discovery approaches and techniques for structured and unstructured dataList challenges associated with data discovery in the cloudEnable data classification using microsoft azure information protection for sensitive data such as protected health information, personally identifiable information, and card holder dataRecognize how pki provides security for digital it solutions
-
Use powershell to create pki certificatesGenerate certificates in a microsoft azure key vaultDefine how vpns are used for secure cloud resource accessConfigure a microsoft azure point-to-site vpnConfigure a custom microsoft azure key vault key for storage account encryptionSummarize the key concepts covered in this course
IN THIS COURSE
-
2m 20s
-
3m 30sUpon completion of this video, you will be able to list IRM objectives such as data rights, provisioning, and access models. FREE ACCESS
-
3m 39sAfter completing this video, you will be able to recognize data discovery approaches and techniques for structured and unstructured data. FREE ACCESS
-
3m 19sUpon completion of this video, you will be able to list challenges associated with data discovery in the cloud. FREE ACCESS
-
5m 6sIn this video, find out how to enable data classification using Microsoft Azure Information Protection for sensitive data such as Protected Health Information, Personally Identifiable Information, and cardholder data. FREE ACCESS
-
5m 8sUpon completion of this video, you will be able to recognize how PKI provides security for digital IT solutions. FREE ACCESS
-
4m 25sIn this video, you will learn how to use PowerShell to create PKI certificates. FREE ACCESS
-
3m 2sIn this video, learn how to generate certificates in Microsoft Azure Key Vault. FREE ACCESS
-
2m 26sIn this video, you will learn how VPNs are used for secure cloud resource access. FREE ACCESS
-
6m 9sLearn how to configure a Microsoft Azure point-to-site VPN. FREE ACCESS
-
2m 33sIn this video, find out how to configure a custom Microsoft Azure Key Vault key for encrypting your storage account. FREE ACCESS
-
1m 9s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.