CCSP 2019: Data Security Technologies

CCSP    |    Intermediate
  • 12 videos | 36m 3s
  • Includes Assessment
  • Earns a Badge
Rating 4.4 of 51 users Rating 4.4 of 51 users (51)
Responsibility for managing data falls on the cloud customer. In this 7-video course, learners explore data storage, threats, and security mitigations to help ensure data protection. Examine security techniques such as hashing, data masking, data tokenization, and data loss prevention. This course can be used in preparation for the (ISC)2 Certified Cloud Security Professional (CCSP) exam. Begin by looking at various technologies associated with data asset security and protection. Examine Amazon Web Services storage types including long-term, ephemeral, and raw-disk. Learn how to differentiate between data owner and data custodian, including risk profile, risk appetite, and responsibility. Look at potential threats associated with storage types including ISO/IEC 27040. Learn about encryption for Microsoft Azure virtual machine disks, and about key management, which involves creating an Azure Key Vault and key. Discover how to generate files hashes using Microsoft PowerShell. Look at data masking, or enabling Microsoft Azure SQL Database dynamic masking (obfuscation), and data tokenization technologies. Finally, learn about data loss prevention by configuring Microsoft Azure Information Protection.

WHAT YOU WILL LEARN

  • Discover the key concepts covered in this course
    Define the various technologies associated with data asset security and protection
    Describe amazon web services storage types including long term, ephemeral, and raw-disk
    Differentiate between data owner and data custodian, including risk profile, risk appetite, and responsibility
    Describe potential threats associated with storage types including iso/iec 27040
    Enable encryption for microsoft azure virtual machine disks
  • Create a microsoft azure key vault and key
    Generate file hashes using microsoft powershell
    Enable microsoft azure sql database dynamic masking (obfuscation)
    Describe data tokenization technologies
    Configure microsoft azure information protection
    Summarize the key concepts covered in this course

IN THIS COURSE

  • 2m 8s
  • 3m 1s
    During this video, you will learn how to define the various technologies associated with data asset security and protection. FREE ACCESS
  • Locked
    3.  Storage Types
    4m 6s
    After completing this video, you will be able to describe Amazon Web Services storage types including long-term, ephemeral, and raw-disk. FREE ACCESS
  • Locked
    4.  Data Owner vs. Data Custodian
    2m 19s
    In this video, learn how to differentiate between data owner and data custodian, including risk profile, risk appetite, and responsibility. FREE ACCESS
  • Locked
    5.  Storage Type Threat
    4m 16s
    Upon completion of this video, you will be able to describe potential threats associated with storage types including ISO/IEC 27040. FREE ACCESS
  • Locked
    6.  Encryption of Data Assets
    5m 15s
    In this video, you will enable encryption for disks on Microsoft Azure virtual machines. FREE ACCESS
  • Locked
    7.  Key Management
    3m 44s
    During this video, you will learn how to create a Microsoft Azure Key Vault and a key. FREE ACCESS
  • Locked
    8.  Hashing
    2m 49s
    In this video, learn how to generate file hashes using Microsoft PowerShell. FREE ACCESS
  • Locked
    9.  Data Masking
    2m 20s
    During this video, you will learn how to enable Microsoft Azure SQL Database dynamic masking. FREE ACCESS
  • Locked
    10.  Data Tokenization
    2m 32s
    Upon completion of this video, you will be able to describe data tokenization technologies. FREE ACCESS
  • Locked
    11.  Data Loss Prevention
    2m 39s
    In this video, learn how to configure Microsoft Azure Information Protection. FREE ACCESS
  • Locked
    12.  Course Summary
    56s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.7 of 41 users Rating 4.7 of 41 users (41)
Rating 4.5 of 116 users Rating 4.5 of 116 users (116)
Rating 4.6 of 40 users Rating 4.6 of 40 users (40)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.6 of 68 users Rating 4.6 of 68 users (68)
Rating 4.7 of 74 users Rating 4.7 of 74 users (74)
Rating 4.6 of 40 users Rating 4.6 of 40 users (40)