PLU | Getting Started With Data Loss Prevention (2019 EN)

Discussion in 'Information Technology' started by Kanka, Jul 19, 2019.

  1. Kanka

    Kanka Well-Known Member Loyal User

    Messages:
    16,047
    Likes Received:
    449
    Trophy Points:
    83
    [​IMG]

    Company: Pluralsight
    Author: Richard Harpur
    Full Title: Getting Started With Data Loss Prevention
    Year: 2019
    Language: English
    Genre: Educational: Networking administration
    Skill Level: Beginner
    Price: -
    -
    Files: MP4 (+ Slides .PDF, Subtitles .SRT)
    Time: 02:01:28
    Video: AVC, 1280 x 720 (1.778) at 30.000 fps, 200 kbps
    Audio: AAC at 96 Kbps, 2 channels, 48.0 KHz



    Organization’s data is at a greater risk of data loss than ever before. Workloads are moving to the cloud, volumes of data are increasing. Learn to develop a threat model and to deploy solutions to protect against malicious and accidental data loss..

    Data loss is an increasing problem with network perimeters disappearing and more data moving to cloud-based services. In this course, Getting Started with Data Loss Prevention, you will learn how to mitigate this threat in your organization. First, you will see how to define a threat model for data loss. Next, you will explore how to identify the key data loss vectors including endpoint, email, cloud, and web data loss. Finally, you will discover less obvious data loss vectors such as social media and physical loss. When you’re finished taking this course, you will have mastered the approach for preparing a data loss prevention strategy and have knowledge of various technologies available to help reduce the risk in your organization.


    Lessons:
    1. Course Overview
    01. Course Overview
    2. What Is Data Loss Prevention and Why You Need It?
    02. Module Overview
    03. Malicious and Accidental Data Loss
    04. Why DLP Importance Is Growing
    05. The Perimeter-less Network and DLP Risks
    06. Laws and Regulations
    07. Course Outline
    08. Globomantics DLP Case Study
    09. Module Summary
    3. Creating Your Data Loss Threat Model
    10. Module Overview
    11. Selecting a Threat Model Methodology
    12. Installing the Microsoft Threat Modeling Tool
    13. Demo: Creating a Threat Model
    14. Globomantics DLP Threats
    15. Real World DLP Examples
    16. Module Summary
    4. Protecting from Endpoint Device Data Loss
    17. Module Overview
    18. Endpoint Threat Vectors
    19. Full Disk Encryption (FDE)
    20. Device Hardening
    21. Demo: Using InTune to Enforce Policies
    22. Module Summary
    5. Protecting from Email Based Data Loss
    23. Module Overview
    24. Data Loss Risks from Email
    25. Accidental Email Data Loss
    26. Malicious Email Data Loss
    27. Configuring a DLP Policy
    28. Module Summary
    6. Safeguarding from Cloud and Web-based Data Loss
    29. Module Overview
    30. Cloud-based Data Loss Risks
    31. Data Exfiltration Targets
    32. Demo: Cloud App Security
    33. Module Summary
    7. Protecting from Social Media Data Loss
    34. Module Overview
    35. Real World DLP Examples
    36. Preventing Social Media Data Loss
    37. Module Summary
    8. Considering Physical Data Loss Risks
    38. Module Overview
    39. Physical Data Loss Examples
    40. Preventing Physical Data Loss
    41. Module Summary
    9. Building Your Roadmap for Starting with Data Loss Prevention
    42.Roadmap for Starting with Data Loss Prevention
    43.Further Learning


    -------------
     
    Last edited: Jul 19, 2019