Take advantage of spring savings with up to 50% off ILT training.

Checkout

Cart () Loading...

    • Quantity:
    • Delivery:
    • Dates:
    • Location:

    $

Contact Sales

IBM Security Guardium Data Protection Foundations

IBM Security GuardiumData Protection (Guardium) supports a zero trust approach to security.

IBM Security Guardium Data Protection (Guardium) supports a zero trust approach to security. It discovers andclassifies sensitive data from across an enterprise, providing real time data activity monitoring and advanced userbehavior analytics to help discover unusual activity around sensitive data.

Guardium provides a broad range of data security and protection capabilities that can protect sensitive and regulateddata across environments and platforms. This course provides the foundational level processes, procedures, andpractices necessary to configure Guardium to monitor and protect sensitive data. Hands-on exercises reinforce theskills learned.

*Note: this course is based upon IBM Security Guardium Data Protection v11.4.

GK# 821620 Vendor# 8G103G
Vendor Credits:
No matching courses available.
Start learning as soon as today! Click Add To Cart to continue shopping or Buy Now to check out immediately.
Access Period:
Scheduling a custom training event for your team is fast and easy! Click here to get started.

Is This The Right Course?

Before taking this course, make sure that you have the following skills:

  • Working knowledge of SQL queries for IBM DB2 and other databases
  • Working knowledge of NoSQL type databases
  • Working knowledge of UNIX commands
  • Ability to use a UNIX text editor such as vi
  • Familiarity with data protection standards such as HIPAA, PCI, GDPR, and SOX

Who Should Attend?

Database administrators, security administrators, security analysts, security technical architects, and professional services using Guardium.

What You'll Learn

Students will learn to,

  • Identify the primary functions of IBM Security Guardium Data Protection
  • Apply key Guardium architecture components
  • Navigate the Guardium user interface and command line interface
  • Manage user access to Guardium
  • Build and populate Guardium groups
  • Use system settings and data management tools to manage, configure and monitor Guardium resources
  • Use database discovery and the Vulnerability Assessment application to perform data security tasks
  • Configure policy rules that process the information gathered from database and file servers
  • Create queries and reports to examine trends and gather data
  • Use Guardium alerts to monitor a data environment
  • Use Guardium audit process tools to streamline the compliance process

Course Outline

  • Unit 1: Guardium overview
  • Unit 2: Guardium architecture
  • Unit 3: Guardium user interfaces
  • Unit 4: Access management
  • Unit 5: Guardium groups
  • Unit 6: System & data management
  • Unit 7: Guardium discovery & vulnerability assessment
  • Unit 8: Policy management
  • Unit 9: Guardium reporting
  • Unit 10: Guardium alerts
  • Unit 11: Audit process automation

Prerequisites

Before taking this course, make sure that you have the following skills:

  • Working knowledge of SQL queries for IBM DB2 and other databases
  • Working knowledge of NoSQL type databases
  • Working knowledge of UNIX commands
  • Ability to use a UNIX text editor such as vi
  • Familiarity with data protection standards such as HIPAA, PCI, GDPR, and SOX