HOME > IT & Software > Data Loss Prevention (DLP) Security breaches under control

Data Loss Prevention (DLP) Security breaches under control

SynopsisData Loss Prevention (DLP – Security breaches under co...
Data Loss Prevention (DLP) Security breaches under control  No.1

Data Loss Prevention (DLP) – Security breaches under control, available at $44.99, has an average rating of 4.17, with 33 lectures, based on 985 reviews, and has 3794 subscribers.

You will learn about Designs of Data Loss Prevention systems Basic and advanced features of DLP Create a basic regular expression (Regex) Implement your own DLP system using a VM Create and implement content-aware policies Learn how to protect against data leaks Integrate DLP with Microsoft Active Directory This course is ideal for individuals who are Anyone looking for a high-level overview of DLP systems or Engineers and managers interesting in implementing DLP It is particularly useful for Anyone looking for a high-level overview of DLP systems or Engineers and managers interesting in implementing DLP.

Enroll now: Data Loss Prevention (DLP) – Security breaches under control

Summary

Title: Data Loss Prevention (DLP) – Security breaches under control

Price: $44.99

Average Rating: 4.17

Number of Lectures: 33

Number of Published Lectures: 33

Number of Curriculum Items: 33

Number of Published Curriculum Objects: 33

Original Price: $27.99

Quality Status: approved

Status: Live

What You Will Learn

  • Designs of Data Loss Prevention systems
  • Basic and advanced features of DLP
  • Create a basic regular expression (Regex)
  • Implement your own DLP system using a VM
  • Create and implement content-aware policies
  • Learn how to protect against data leaks
  • Integrate DLP with Microsoft Active Directory
  • Who Should Attend

  • Anyone looking for a high-level overview of DLP systems
  • Engineers and managers interesting in implementing DLP
  • Target Audiences

  • Anyone looking for a high-level overview of DLP systems
  • Engineers and managers interesting in implementing DLP
  • Did you know that almost 50% of employees transfer business files to a private laptop? Is there anything we can do about it? Yes – implement a Data Loss Prevention (DLP) system to address potential data loss or theft on Windows, Mac OS X, Linux, and mobile devices. Protect your sensitive files, clients’ information, credit card numbers, and more.

    With a DLP system you decide when, from where, and by whom data can or cannot be accessed and copied! 

    About this course: This is a vendor-neutral introductory course providing a high-level overview of DLP systems, architecture, components, and features. Hands-on labsincluded!

    What I will learn: How to start with a DLP system, create a basic policy, understand DLP components, and even create your first regular expression (regex).

    Special topics: Even though this is a vendor-neutral course, I show you a lot of real world examples and DLP systems that you can try at home – for free!

    Join this course to learn:

  • Data Loss Prevention (DLP) architecture

  • Endpoint vs Network protection

  • Data at rest, Data in motion, Data in use

  • Deploy your own DLP system in minutes using a virtual machine

  • See a lot of examples and real world applications (e.g. blocking uploads, sharing programming codes)

  • Write your first regular expression

  • Learn about more advanced DLP features (SSL interception, OCR, integration with Active Directory)

  • See a lot of real world examples and practical tips

  • You will know enough to understand how DLP protects your network

  • Join now and see what a DLP system can do for you and your company! Protect USB drives, clipboard, network drives, email clients, Skype, and more. Make sure nobody can share or copy your internal files and data ever again.

    This is a vendor-neutral course that will make you ready to start with any DLP system, including enterprise solutions from Symantec or McAfee. Hands-on labs are based on two DLP systems: DeviceLock and EndpointProtector. A real-world course.

    Join now and learn all the basic about DLP with this unique course.

    Course Curriculum

    Chapter 1: Introduction to Data Loss Prevention (DLP) systems

    Lecture 1: Welcome!

    Lecture 2: Why do we Need a DLP Solution?

    Lecture 3: Implement a Test DLP System for Free!

    Lecture 4: DLP Systems in Action

    Lecture 5: Did you Know That 50% of Users

    Lecture 6: Data Leakage and Channels

    Lecture 7: Quick Overview of Data Types

    Lecture 8: Lets Summarize this Chapter

    Chapter 2: DLP in Action

    Lecture 1: What to Expect in This Section

    Lecture 2: Endpoint DLP Architecture

    Lecture 3: Lets Block the Leakage of Client Data

    Lecture 4: Blocking an SQL Query – Lab

    Lecture 5: Network DLP Solutions

    Lecture 6: Monitor or Block Lets see!

    Lecture 7: Lets Summarize This Chapter

    Chapter 3: Interesting Features of DLP

    Lecture 1: What to Expect in This Section

    Lecture 2: Clipboard Monitoring

    Lecture 3: Built-in Rules: Passport, ID, Credit Card Number, Email Addresses

    Lecture 4: Detailed Reporting in DLP

    Lecture 5: OCR and Other Features

    Lecture 6: Even More Features: Protect Printing, VM, and More!

    Chapter 4: More About DLP

    Lecture 1: What to Expect in This Section

    Lecture 2: Enterprise DLP

    Lecture 3: Introduction to Regular Expressions

    Lecture 4: Examples of RegEx

    Lecture 5: False Positives, False Negatives

    Lecture 6: Lets Summarize the Course

    Lecture 7: Examples

    Chapter 5: Supplementary Videos

    Lecture 1: How to Use Virtual Box

    Lecture 2: Installing Windows Server and Windows 10

    Lecture 3: Introduction to Active Directory

    Lecture 4: Group Policy in Action

    Lecture 5: Ethical Hacking

    Instructors

  • Data Loss Prevention (DLP) Security breaches under control  No.2
    Marious Kuriata
    IT Exam Practice, Network Engineer and Instructor
  • Rating Distribution

  • 1 stars: 13 votes
  • 2 stars: 28 votes
  • 3 stars: 166 votes
  • 4 stars: 387 votes
  • 5 stars: 391 votes
  • Frequently Asked Questions

    How long do I have access to the course materials?

    You can view and review the lecture materials indefinitely, like an on-demand channel.

    Can I take my courses with me wherever I go?

    Definitely! If you have an internet connection, courses on Udemy are available on any device at any time. If you don’t have an internet connection, some instructors also let their students download course lectures. That’s up to the instructor though, so make sure you get on their good side!