CCSP 2019: Data Security Technologies
CCSP 2019 | Intermediate
- 12 videos | 36m 3s
- Includes Assessment
- Earns a Badge
Responsibility for managing data falls on the cloud customer. In this 7-video course, learners explore data storage, threats, and security mitigations to help ensure data protection. Examine security techniques such as hashing, data masking, data tokenization, and data loss prevention. This course can be used in preparation for the (ISC)2 Certified Cloud Security Professional (CCSP) exam. Begin by looking at various technologies associated with data asset security and protection. Examine Amazon Web Services storage types including long-term, ephemeral, and raw-disk. Learn how to differentiate between data owner and data custodian, including risk profile, risk appetite, and responsibility. Look at potential threats associated with storage types including ISO/IEC 27040. Learn about encryption for Microsoft Azure virtual machine disks, and about key management, which involves creating an Azure Key Vault and key. Discover how to generate files hashes using Microsoft PowerShell. Look at data masking, or enabling Microsoft Azure SQL Database dynamic masking (obfuscation), and data tokenization technologies. Finally, learn about data loss prevention by configuring Microsoft Azure Information Protection.
WHAT YOU WILL LEARN
discover the key concepts covered in this coursedefine the various technologies associated with data asset security and protectiondescribe Amazon Web Services storage types including long term, ephemeral, and raw-diskdifferentiate between data owner and data custodian, including risk profile, risk appetite, and responsibilitydescribe potential threats associated with storage types including ISO/IEC 27040enable encryption for Microsoft Azure virtual machine disks
create a Microsoft Azure Key Vault and keygenerate file hashes using Microsoft PowerShellenable Microsoft Azure SQL Database dynamic masking (obfuscation)describe data tokenization technologiesconfigure Microsoft Azure Information Protectionsummarize the key concepts covered in this course
IN THIS COURSE
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.Digital badges are yours to keep, forever.
YOU MIGHT ALSO LIKE
PEOPLE WHO VIEWED THIS ALSO VIEWED THESE
Course Internet & Wireless Security
Course Attack Vectors & Mitigations