Data Access & Governance Policies: Data Access Governance & IAM
Intermediate
- 13 videos | 58m 16s
- Includes Assessment
- Earns a Badge
This course explores how a DAG (Data Access Governance), a structured data access framework, can reduce the likelihood of data security breaches, and reduce the likelihood of future breaches. Risk and data safety compliance addresses how to identify threats against an organization's digital data assets. You will learn about legal compliance, industry regulations, and compliance with organizational security policies. You will learn how the IAM (identity and access management) relates to users, devices, or software components. Learners will then explore how a PoLP (Principle of Least Privilege) dictates to whom and what permission is given to users to access data. You will learn to create an IAM user and group within AWS (Amazon Web Services), and how to assign file system permissions to a Windows server in accordance with the principle of least privilege. Finally, you will examine how vulnerability assessments are used to identify security weaknesses, and different types of preventative security controls, for example, firewalls or malware scanning.
WHAT YOU WILL LEARN
-
Discuss how data access governance identifies and protects digital assets through policiesList examples of standard security accreditations related to the protection of sensitive dataProvide examples of security controls related to data accessibilityDiscuss how dlp, user awareness and training, applying updates, encryption, and malware scanning can minimize data breachesMap hr job roles to it system and data permissionsSet windows ntfs file system permissions in accordance with the principle of least privilege
-
Identify the role iam plays in a data governance frameworkUse the aws console to create iam users and groupsUse the aws console to assign permissions policies to iam groupsMitigate data breach events by identifying weaknessesFulfill organizational and regulatory data security requirementsImplement effective security controls to protect data
IN THIS COURSE
-
1m 57s
-
6m 40sIn this video, you will discuss how data access governance identifies and protects digital assets through the use of policies. FREE ACCESS
-
4m 24sAfter completing this video, you will be able to list examples of standard security accreditations related to the protection of sensitive data. FREE ACCESS
-
5m 14sAfter completing this video, you will be able to provide examples of security controls related to data accessibility. FREE ACCESS
-
3m 49sIn this video, you will discuss how data loss prevention, user awareness and training, applying updates, encryption, and malware scanning can minimize data breaches. FREE ACCESS
-
4m 40sIn this video, you will map HR job roles to IT system and data permissions. FREE ACCESS
-
5m 53sIn this video, learn how to set Windows NTFS file system permissions in accordance with the principle of least privilege. FREE ACCESS
-
6m 28sDuring this video, you will learn how to identify the role IAM plays in a data governance framework. FREE ACCESS
-
3m 26sDuring this video, you will learn how to use the AWS console to create IAM users and groups. FREE ACCESS
-
3m 48sIn this video, you will learn how to use the AWS console to assign permissions policies to IAM groups. FREE ACCESS
-
3m 16sIn this video, you will learn how to reduce the chances of data breaches by identifying weaknesses. FREE ACCESS
-
4m 17sIn this video, learn how to meet organizational and regulatory data security requirements. FREE ACCESS
-
4m 25sIn this video, learn how to implement effective security controls to protect your data. FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.