Data Access & Governance Policies: Data Access Governance & IAM

  • 13 Videos | 1h 3m 46s
  • Includes Assessment
  • Earns a Badge
Likes 82 Likes 82
This course explores how a DAG (Data Access Governance), a structured data access framework, can reduce the likelihood of data security breaches, and reduce the likelihood of future breaches. Risk and data safety compliance addresses how to identify threats against an organization's digital data assets. You will learn about legal compliance, industry regulations, and compliance with organizational security policies. You will learn how the IAM (identity and access management) relates to users, devices, or software components. Learners will then explore how a PoLP (Principle of Least Privilege) dictates to whom and what permission is given to users to access data. You will learn to create an IAM user and group within AWS (Amazon Web Services), and how to assign file system permissions to a Windows server in accordance with the principle of least privilege. Finally, you will examine how vulnerability assessments are used to identify security weaknesses, and different types of preventative security controls, for example, firewalls or malware scanning.

WHAT YOU WILL LEARN

  • discuss how data access governance identifies and protects digital assets through policies
    list examples of standard security accreditations related to the protection of sensitive data
    provide examples of security controls related to data accessibility
    discuss how DLP, user awareness and training, applying updates, encryption, and malware scanning can minimize data breaches
    map HR job roles to IT system and data permissions
    set Windows NTFS file system permissions in accordance with the principle of least privilege
  • identify the role IAM plays in a data governance framework
    use the AWS console to create IAM users and groups
    use the AWS console to assign permissions policies to IAM groups
    mitigate data breach events by identifying weaknesses
    fulfill organizational and regulatory data security requirements
    implement effective security controls to protect data

IN THIS COURSE

  • Playable
    1. 
    Course Overview
    1m 57s
    UP NEXT
  • Playable
    2. 
    Data Access Governance
    6m 40s
  • Locked
    3. 
    Risk and Data Safety Compliance
    4m 24s
  • Locked
    4. 
    Data Access Patterns
    5m 14s
  • Locked
    5. 
    Data Breach Prevention
    3m 49s
  • Locked
    6. 
    Least Privilege
    4m 40s
  • Locked
    7. 
    Assign and View Effective File System Permissions
    5m 53s
  • Locked
    8. 
    Identity and Access Management
    6m 28s
  • Locked
    9. 
    Create an AWS IAM User and Group
    3m 26s
  • Locked
    10. 
    Assign AWS IAM Group Permissions
    3m 48s
  • Locked
    11. 
    Vulnerability Assessments
    3m 16s
  • Locked
    12. 
    Implement Effective Security Controls
    4m 17s
  • Locked
    13. 
    Exercise: Implement Data Access Governance Solutions
    4m 25s

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion of this course, which can be shared on any social network or business platform

Digital badges are yours to keep, forever.

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Likes 60 Likes 60  
Likes 34 Likes 34