Data Rights Management, Policies, & Event Tracing

Cloud    |    Expert
  • 8 videos | 34m 45s
  • Includes Assessment
  • Earns a Badge
Rating 4.7 of 73 users Rating 4.7 of 73 users (73)
In any infrastructure, it's critical to ensure authorized data access and procedure enforcement. Examine cloud data security, including rights management; retention, deletion, and archiving policies; and tracing data events.

WHAT YOU WILL LEARN

  • Define data rights objects in terms of user access control, managing roles, and role-based access options. describe the appropriate tools to implement and secure drm.
    Define data retention policy principles and how to develop appropriate practices
    Outline principles, and how to define and manage data deletion procedure and methodologies
    Outline principles, and how to define and manage data archiving procedures and methodologies
  • List event sources and associated identity
    Detail event recording, analyzing event data, and aspects of storage and protection of event data. define the cyclical nature of event handling and event dynamics such as optimization, managing and reacting to change, and minimizing false positive objects.
    Describe coc as it applies to data hosted on the cloud. understand how nonrepudiation is handled within a cloud hosting environment.
    Describe common storage media threats, data protection techniques and failover archtectures. the learner should describe event and perfornace data options available for the cloud service consumer

IN THIS COURSE

  • 5m 28s
    In this video, find out how to define data rights objects in terms of user access control, managing roles, and role-based access options. Describe the appropriate tools to implement and secure Digital Rights Management. FREE ACCESS
  • 4m 21s
    In this video, you will learn about data retention policy principles and how to develop appropriate practices. FREE ACCESS
  • Locked
    3.  Data Deletion
    4m 55s
    In this video, you will outline principles, and how to define and manage data deletion procedures and methodologies. FREE ACCESS
  • Locked
    4.  Data Archiving
    3m 49s
    In this video, you will outline principles, and how to define and manage data archiving procedures and methodologies. FREE ACCESS
  • Locked
    5.  Event Sources
    4m 35s
    After completing this video, you will be able to list event sources and their associated identities. FREE ACCESS
  • Locked
    6.  Event Logging, Storage, and Analysis
    4m 10s
    In this video, you will detail event recording, analyzing event data, and aspects of storage and protection of event data. Define the cyclical nature of event handling and event dynamics such as optimization, managing and reacting to change, and minimizing false positive objects. FREE ACCESS
  • Locked
    7.  Chain of Custody and Nonrepudiation
    4m 29s
    After completing this video, you will be able to describe COC as it applies to data hosted on the cloud. Understand how nonrepudiation is handled within a cloud hosting environment. FREE ACCESS
  • Locked
    8.  Exercise: Specifying Data Asset Security
    3m
    Upon completion of this video, you will be able to describe common storage media threats, data protection techniques and failover architectures. The learner should describe event and performance data options available for the Cloud Service Consumer. FREE ACCESS

EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE

Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.

Digital badges are yours to keep, forever.

YOU MIGHT ALSO LIKE

Rating 4.7 of 41 users Rating 4.7 of 41 users (41)
Rating 4.6 of 27 users Rating 4.6 of 27 users (27)
Rating 4.5 of 40 users Rating 4.5 of 40 users (40)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.6 of 129 users Rating 4.6 of 129 users (129)
Rating 3.9 of 1326 users Rating 3.9 of 1326 users (1326)
Rating 4.4 of 19511 users Rating 4.4 of 19511 users (19511)