Data Compliance: Big Data intermediate
  • 2 Courses | 1h 28m 42s
  • 2 Courses | 2h 16m 32s
Rating 5.0 of 1 users Rating 5.0 of 1 users (1)
Explore compliance and its relationship with big data.


Data Compliance Issues & Strategies

  • 1m 13s
  • 3m 36s


Data Access & Governance Policies: Data Access Governance & IAM

  • 1m 57s
  • 6m 40s


Data Compliance Issues & Strategies
the key areas for compliance in data protection: policies and legal regulations. You will learn how an organization can develop a policy framework. In this course, learners examine the legal regulations applicable to data protection, and company policies, the internal documents, and procedures an organization implements to comply with the law. You will learn how to develop a policy framework, and how to establish internal rules for personnel. You will also learn about some of the organizations that have developed regional policies, for example, the APEC (Asia-Pacific Economic Cooperation) Privacy Framework, and the OECD (Organisation for Economic Co-operation) Privacy Principles. Finally, you will explore procedures for internal and external reporting, and other responses to data breaches
13 videos | 43m has Assessment available Badge
Implementing Governance Strategies
This course explores the key concepts behind governance and its relationship with big data. Big data are large and complex, often being represented by massive amounts of very granular data that need to be protected from misuse. This 12-video course examines the five main requirements when an all-encompassing governance strategy is being planned and designed. You will first learn to build a data governance plan by first identifying the most important data domain. Then learn the importance of assembling a data governance body for an organization's big data activities; and how to identify the stakeholders that need to be part of a data governance program. Next, you will learn why the members' governance body should be fairly diverse, well trained, and informed of the policies surrounding the collection of data and the procedures for using the data; and should include compliance professionals who understand the rules and regulations applicable to your corporate structure. Finally, you will explore the issues involved in cloud storage of big data.
13 videos | 45m has Assessment available Badge


Data Access & Governance Policies: Data Access Governance & IAM
This course explores how a DAG (Data Access Governance), a structured data access framework, can reduce the likelihood of data security breaches, and reduce the likelihood of future breaches. Risk and data safety compliance addresses how to identify threats against an organization's digital data assets. You will learn about legal compliance, industry regulations, and compliance with organizational security policies. You will learn how the IAM (identity and access management) relates to users, devices, or software components. Learners will then explore how a PoLP (Principle of Least Privilege) dictates to whom and what permission is given to users to access data. You will learn to create an IAM user and group within AWS (Amazon Web Services), and how to assign file system permissions to a Windows server in accordance with the principle of least privilege. Finally, you will examine how vulnerability assessments are used to identify security weaknesses, and different types of preventative security controls, for example, firewalls or malware scanning.
13 videos | 58m has Assessment available Badge
Data Access & Governance Policies: Data Classification, Encryption, & Monitoring
Explore how data classification determines which security measures apply to varying classes of data. This 12-video course classifies data into a couple of main categories, internal data and sensitive data. You will learn to classify data by using Microsoft FSRM (File Server Resource Manager), a role service in Windows Server that enables you to manage and classify data stored on file servers. Learners will explore different tools used to safeguard sensitive information, such as data encryption. You will learn how to enable Microsoft BitLocker, a full volume encryption feature included with Microsoft Windows, to encrypt data at rest. An important aspect of data access governance is securing data that is being transmitted over a network, and you will learn to configure a VPN (virtual private network) using Microsoft System Center Configuration Manager. You will learn to configure a Custom Filtered Log View using MS Windows Event Viewer to track user access to a database. Finally, you will learn to audit file access on an MS Windows Server 2016 host.
13 videos | 1h 18m has Assessment available Badge


Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.


Channel Snowflake
Rating 5.0 of 2 users Rating 5.0 of 2 users (2)