Course details

Data Access & Governance Policies: Data Classification, Encryption, and Monitoring

Data Access & Governance Policies: Data Classification, Encryption, and Monitoring


Overview/Description
Expected Duration
Lesson Objectives
Course Number
Expertise Level



Overview/Description

As organizations start to master data science and the volume of data collection incraeses, data
sensitivity and security breaches are common in news media reports. Before data can be sufficiently protected, its sensitivity must be known. In thius course you will exxplore how data classification determines which security measure applies to varying classes of data.



Expected Duration (hours)
1.3

Lesson Objectives

Data Access & Governance Policies: Data Classification, Encryption, and Monitoring

  • Course Overview
  • recognize the importance of data classification
  • use Microsoft File Server Resource Manager to set file classification values
  • recall methods of encrypting sensitive data
  • enable Microsoft BitLocker to protect data at rest
  • configure and test Microsoft VPN to protect data in motion
  • use Microsoft System Center Configuration Manager to view managed device security compliance
  • identify the relevance of tracking data access trends
  • identify how data access can be monitored through SIEM and reports
  • recognize how logging and auditing feed into data analytics
  • enable filtered logs in the Windows Event Viewer
  • configure file system object auditing using Group Policy
  • use encryption to protect data and monitor data access
  • Course Number:
    it_dsgpaccdj_02_enus

    Expertise Level
    Intermediate