8G102G  IBM Security Guardium Data Protection Foundations

Duração:     None Dias

Nível:           Básico

Audiência:   Cyber-security Professional

PRÓXIMAS SESSÕES
Início (AAAA-MM-DD) Fim (AAAA-MM-DD) Língua Preço
2023-11-06 2023-11-08 Português 2200 EUR 1405
2023-11-20 2023-11-22 Português 2200 EUR 1419
2023-12-04 2023-12-06 Português 2200 EUR 1433
2023-12-18 2023-12-20 Português 2200 EUR 1447
2024-01-15 2024-01-17 Português 2200 EUR 1475
2024-01-29 2024-01-31 Português 2200 EUR 1489
2024-02-12 2024-02-14 Português 2200 EUR 1503
2024-02-26 2024-02-28 Português 2200 EUR 1517
2024-03-11 2024-03-13 Português 2200 EUR 1531
2024-03-25 2024-03-27 Português 2200 EUR 1545
2024-04-08 2024-04-10 Português 2200 EUR 1559
2024-04-22 2024-04-24 Português 2200 EUR 1573
2024-05-06 2024-05-08 Português 2200 EUR 1587
2024-05-20 2024-05-22 Português 2200 EUR 1601
2024-06-03 2024-06-05 Português 2200 EUR 1615
2024-06-17 2024-06-19 Português 2200 EUR 1629
SÍNTESE

IBM Security® Guardium® Data Protection (Guardium) supports a zero trust approach to security. It discovers and classifies sensitive data from across an enterprise, providing real time data activity monitoring and advanced user behavior analytics to help discover unusual activity around sensitive data.

 

Guardium provides a broad range of data security and protection capabilities that can protect sensitive and regulated data across environments and platforms. This course provides the foundational level processes, procedures, and practices necessary to configure Guardium to monitor and protect sensitive data. Hands-on exercises reinforce the skills learned. 

 

*Note: this course is based upon IBM Security® Guardium® Data Protection v11.4.

 

PREREQUISITOS

Before taking this course, make sure that you have the following skills:

  • Working knowledge of SQL queries for IBM DB2 and other databases
  • Working knowledge of NoSQL type databases
  • Working knowledge of UNIX commands
  • Ability to use a UNIX text editor such as vi
  • Familiarity with data protection standards such as HIPAA, PCI, GDPR, and SOX
  • Identify the primary functions of IBM Security Guardium Data Protection
  • Apply key Guardium architecture components
  • Navigate the Guardium user interface and command line interface
  • Manage user access to Guardium
  • Build and populate Guardium groups
  • Use system settings and data management tools to manage, configure and monitor Guardium resources
  • Use database discovery and the Vulnerability Assessment application to perform data security tasks
  • Configure policy rules that process the information gathered from database and file servers
  • Create queries and reports to examine trends and gather data
  • Use Guardium alerts to monitor a data environment
  • Use Guardium audit process tools to streamline the compliance process

Unit 1: Guardium overview

Unit 2: Guardium architecture

Unit 3: Guardium user interfaces

Unit 4: Access management

Unit 5: Guardium groups

Unit 6: System & data management

Unit 7: Guardium discovery & vulnerability assessment

Unit 8: Policy management

Unit 9: Guardium reporting

Unit 10: Guardium alerts

Unit 11: Audit process automation