Data Engineering on Microsoft Azure: Data Policies & Standards
Azure
| Intermediate
- 11 videos | 1h 7m 14s
- Includes Assessment
- Earns a Badge
Data policies and standards help to ensure a repeatable security standard is maintained. In this course, you'll learn about data encryption scenarios and best practices. You'll explore how Azure Transparent Database Encryption and Always Encrypted can be used to ensure data at rest is protected. Next, you'll examine how data classification and data masking can protect data being viewed. You'll learn to configure data retention and purging to ensure data is retained or removed. You'll also explore the various means of controlling access to Azure Data Lake Storage Gen2. Finally, you'll learn how to plan a data auditing strategy and how to limit access to data at the row level in a database. This course is one in a collection that prepares learners for the Microsoft Data Engineering on Microsoft Azure (DP-203) exam.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseDescribe scenarios for encrypting data and the best practices for utilizing disk encryption on azureDescribe how transparent data encryption can be used to encrypt an azure sql database, azure sql managed instance, and azure synapse analytics database at restDescribe the always encrypted feature that client applications can use to encrypt data stored in azure sql databaseDescribe how dynamic data masking and classification can identify sensitive data and mask sensitive data in azure sql database, azure sql managed instance, and azure synapse analyticsDescribe best practices for defining a data retention policy
-
Describe guidelines, processes, limitations, and considerations for performing a data purge in azure data explorerRecognize the options for controlling access to azure data lakeDescribe what should be audited for and how technologies on the azure platform can enable an auditing strategyDescribe how row-level security in azure sql database implements restrictions on access to data rowsSummarize the key concepts covered in this course
IN THIS COURSE
-
1m 27s
-
12m 33s8ee0cab4-6ad7-4405-9aa9-49ea4d8542a7 FREE ACCESS
-
8m 8se5710223-ba21-4386-b5b8-58b2aa8350be FREE ACCESS
-
6m 28s79bc34f4-2e7a-422c-852c-48446f7a73c7 FREE ACCESS
-
9m 45sadcde3ac-86ee-4350-aa01-fb2cdcd49d12 FREE ACCESS
-
5m 26s142636ee-6a76-4dbf-97fb-519b4f6262f7 FREE ACCESS
-
5m 14s8d769798-24bf-4847-9f73-ab39ca8ea4ba FREE ACCESS
-
6m 8s4ad82894-1711-42e4-834b-c5640b8f05f4 FREE ACCESS
-
5m 36sca555589-87fe-487a-a1c3-1243c3933a74 FREE ACCESS
-
5m 31s0eac0d62-dfe2-478f-8ed0-d289a92209e7 FREE ACCESS
-
58s75aa3537-aa49-409c-a193-c1db12817ffa FREE ACCESS
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.