Skip to main Content

IBM Guardium Data Protection Fundamentals

  • Code training 8G103G
  • Duur 3 dagen

Andere trainingsmethoden

Op locatie klant Prijs

op aanvraag

Vraag een groepstraining aan Schrijf je in

Methode

Deze training is in de volgende formats beschikbaar:

  • Klassikale training

    Klassikaal leren

  • Op locatie klant

    Op locatie klant

  • Virtueel leren

    Virtueel leren

Vraag deze training aan in een andere lesvorm.

Trainingsbeschrijving

Naar boven

Data security and privacy challengers are never-ending. IBM Guardium Data Protection (Guardium) provides a broad range of data security and protection capabilities that can protect sensitive and regulated data across environments and platforms. It discovers and classifies sensitive data from across an enterprise, providing real-time data activity monitoring and advanced user behavior analytics to help discover unusual data activity.

The course prepares the student to administer Guardium appliances, discover unusual data activity, locate vulnerable data, automate compliance processes, and monitor and protect sensitive data. To proact using Guardium, students complete hands-on lab exercises.

This course is based on Guardium Data Protection version 12.1.

Maatwerk

Global Knowledge biedt zowel standaard- als maatwerkcursussen die zijn afgestemd op uw wensen en die als besloten cursus op uw eigen locatie of onze locatie gevolgd kunnen worden.

Doelgroep

Naar boven

Database administrators, security administrators, security analysts, security technical architects, and professional services using Guardium Data Protection

Trainingsdoelstellingen

Naar boven

After this course, participants will be able to :

  • Identify the primary functions of Guardium Data Protection
  • Describe key Guardium architecture components
  • Navigate the Guardium user interface and use the command line interface
  • Manage user access to Guardium
  • Build and populate Guardium groups
  • Use system settings and management tolls to manage, configure, and monitor Guardium resources
  • Archive, backup, and restore Guardium data
  • Discover sensitive data and perform vulnerability assessments
  • Use Guardium audit process tools to streamline the compliance process
  • Describe how to apply rule order, logic, and actions to Guardium policies
  • Configure policy rules that process the information that is gathered from database and file servers
  • Create Guardium queries and reports to examine trends and gather data
  • Use Guardium alerts to monitor a data environment

Inhoud training

Naar boven

Unit 1: Guardium overview

Unit 2: Guardium architecture

Unit 3: Guardium user interfaces

Unit 4: Access management

Unit 5: Guardium groups

Unit 6: System management

Unit 7: Data management

Unit 8: Guardium discovery & vulnerability assessment

Unit 9: Audit process automation

Unit 10: Policy design

Unit 11: Policy configuration

Unit 12: Guardium reporting

Unit 13: Guardium alerts

Voorkennis

Naar boven

Students should be knowledgeable about the following topics:

  • Working knowledge of SQL queries for IBM Db2 and other databases
  • Working knowledge of UNIX commands
  • Ability to use UNIX text editor such as vi
  • Data protection standards such as HIPAA, PCI, and GDPR