CCSP 2019: Implementing Data Discovery & Classification

CCSP 2019    |    Intermediate
  • 12 Videos | 47m 45s
  • Includes Assessment
  • Earns a Badge
Likes 73 Likes 73
Proper data governance begins with labeling data and applying security controls based on those labels. Explore information rights management (IRM) and challenges associated with data discovery, as well as the roles played by PKI (public key infrastructure) security certificates and virtual private networks (VPNs) in the cloud. This 6-video course prepares learners for the (ISC)2 Certified Cloud Security Professional (CCSP) exam. Begin with IRM objectives such as data rights, provisioning, and access models. Examine data discovery approaches and techniques for structured and unstructured data, and challenges of data discovery in the cloud. Then examine data classification, enabled by using Microsoft Azure Information protection for sensitive data such as Protected Health Information (PHI) and Personally Identifiable Information (PII), and cardholder data. Recognize how PKI provides security for digital IT solutions; how to use PowerShell to create PKI certificates; and how to generate certificates in a Microsoft Azure Key Vault. Learn how VPNs are used for secure cloud resource access. Then configure a Microsoft Azure point-to-site VPN and a custom Microsoft Azure Key Vault key for storage account encryption.

WHAT YOU WILL LEARN

  • discover the key concepts covered in this course
    list IRM objectives such as data rights, provisioning, and access models
    recognize data discovery approaches and techniques for structured and unstructured data
    list challenges associated with data discovery in the cloud
    enable data classification using Microsoft Azure Information Protection for sensitive data such as Protected Health Information, Personally Identifiable Information, and card holder data
    recognize how PKI provides security for digital IT solutions
  • use PowerShell to create PKI certificates
    generate certificates in a Microsoft Azure Key Vault
    define how VPNs are used for secure cloud resource access
    configure a Microsoft Azure point-to-site VPN
    configure a custom Microsoft Azure Key Vault key for storage account encryption
    summarize the key concepts covered in this course

IN THIS COURSE

  • Playable
    1. 
    Course Overview
    2m 20s
    UP NEXT
  • Playable
    2. 
    Information Rights Management
    3m 30s
  • Locked
    3. 
    Data Discovery
    3m 39s
  • Locked
    4. 
    Data Discovery Challenges
    3m 19s
  • Locked
    5. 
    Data Classification
    5m 6s
  • Locked
    6. 
    Public Key Infrastructure
    5m 8s
  • Locked
    7. 
    PowerShell Certificate Generation
    4m 25s
  • Locked
    8. 
    Cloud Certificate Generation
    3m 2s
  • Locked
    9. 
    VPNs and the Cloud
    2m 26s
  • Locked
    10. 
    Configuring a Cloud VPN
    6m 9s
  • Locked
    11. 
    Custom Cloud Storage Encryption Keys
    2m 33s
  • Locked
    12. 
    Course Summary
    1m 9s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

CHANNEL CCSP Bootcamp
Likes 28 Likes 28  
Likes 69 Likes 69  

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Likes 64 Likes 64  
Likes 55 Likes 55