Course details

Data Access & Governance Policies: Data Classification, Encryption, and Monitoring

Data Access & Governance Policies: Data Classification, Encryption, and Monitoring


Overview/Description
Expected Duration
Lesson Objectives
Course Number
Expertise Level



Overview/Description

Explore how data classification determines which security measures apply to varying classes of data. This 12-video course classifies data into a couple of main categories, internal data and sensitive data. You will learn to classify data by using Microsoft FSRM (File Server Resource Manager), a role service in Windows Server that enables you to manage and classify data stored on file servers. Learners will explore different tools used to safeguard sensitive information, such as data encryption. You will learn how to enable Microsoft BitLocker, a full volume encryption feature included with Microsoft Windows, to encrypt data at rest. An important aspect of data access governance is securing data that is being transmitted over a network, and you will learn to configure a VPN (virtual private network) using Microsoft System Center Configuration Manager. You will learn to configure a Custom Filtered Log View using MS Windows Event Viewer to track user access to a database. Finally, you will learn to audit file access on an MS Windows Server 2016 host.



Expected Duration (hours)
1.3

Lesson Objectives

Data Access & Governance Policies: Data Classification, Encryption, and Monitoring

  • Course Overview
  • recognize the importance of data classification
  • use Microsoft File Server Resource Manager to set file classification values
  • recall methods of encrypting sensitive data
  • enable Microsoft BitLocker to protect data at rest
  • configure and test Microsoft VPN to protect data in motion
  • use Microsoft System Center Configuration Manager to view managed device security compliance
  • identify the relevance of tracking data access trends
  • identify how data access can be monitored through SIEM and reports
  • recognize how logging and auditing feed into data analytics
  • enable filtered logs in the Windows Event Viewer
  • configure file system object auditing using Group Policy
  • use encryption to protect data and monitor data access
  • Course Number:
    it_dsgpaccdj_02_enus

    Expertise Level
    Intermediate