• Online, Self-Paced
Course Description

As organizations start to master data science and the volume of data collection increases, data sensitivity and security breaches are common in news media reports. Before data can be sufficiently protected, its sensitivity must be known. In this course you will explore how data classification determines which security measure applies to varying classes of data.

Learning Objectives

Data Access & Governance Policies: Data Classification, Encryption, and Monitoring

  • Course Overview
  • recognize the importance of data classification
  • use Microsoft File Server Resource Manager to set file classification values
  • recall methods of encrypting sensitive data
  • enable Microsoft BitLocker to protect data at rest
  • configure and test Microsoft VPN to protect data in motion
  • use Microsoft System Center Configuration Manager to view managed device security compliance
  • identify the relevance of tracking data access trends
  • identify how data access can be monitored through SIEM and reports
  • recognize how logging and auditing feed into data analytics
  • enable filtered logs in the Windows Event Viewer
  • configure file system object auditing using Group Policy
  • use encryption to protect data and monitor data access

 

Framework Connections

The materials within this course focus on the Knowledge Skills and Abilities (KSAs) identified within the Specialty Areas listed below. Click to view Specialty Area details within the interactive National Cybersecurity Workforce Framework.