CCSP 2019: Data Security Technologies
CCSP 2019
| Intermediate
- 12 Videos | 36m 3s
- Includes Assessment
- Earns a Badge
Responsibility for managing data falls on the cloud customer. In this 7-video course, learners explore data storage, threats, and security mitigations to help ensure data protection. Examine security techniques such as hashing, data masking, data tokenization, and data loss prevention. This course can be used in preparation for the (ISC)2 Certified Cloud Security Professional (CCSP) exam. Begin by looking at various technologies associated with data asset security and protection. Examine Amazon Web Services storage types including long-term, ephemeral, and raw-disk. Learn how to differentiate between data owner and data custodian, including risk profile, risk appetite, and responsibility. Look at potential threats associated with storage types including ISO/IEC 27040. Learn about encryption for Microsoft Azure virtual machine disks, and about key management, which involves creating an Azure Key Vault and key. Discover how to generate files hashes using Microsoft PowerShell. Look at data masking, or enabling Microsoft Azure SQL Database dynamic masking (obfuscation), and data tokenization technologies. Finally, learn about data loss prevention by configuring Microsoft Azure Information Protection.
WHAT YOU WILL LEARN
-
discover the key concepts covered in this coursedefine the various technologies associated with data asset security and protectiondescribe Amazon Web Services storage types including long term, ephemeral, and raw-diskdifferentiate between data owner and data custodian, including risk profile, risk appetite, and responsibilitydescribe potential threats associated with storage types including ISO/IEC 27040enable encryption for Microsoft Azure virtual machine disks
-
create a Microsoft Azure Key Vault and keygenerate file hashes using Microsoft PowerShellenable Microsoft Azure SQL Database dynamic masking (obfuscation)describe data tokenization technologiesconfigure Microsoft Azure Information Protectionsummarize the key concepts covered in this course
IN THIS COURSE
-
1.Course Overview2m 8sUP NEXT
-
2.Data Asset Security and Associated Technologies3m 1s
-
3.Storage Types4m 6s
-
4.Data Owner vs. Data Custodian2m 19s
-
5.Storage Type Threat4m 16s
-
6.Encryption of Data Assets5m 15s
-
7.Key Management3m 44s
-
8.Hashing2m 49s
-
9.Data Masking2m 20s
-
10.Data Tokenization2m 32s
-
11.Data Loss Prevention2m 39s
-
12.Course Summary56s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform
Digital badges are yours to keep, forever.