Company: Pluralsight Author: Richard Harpur Full Title: Getting Started With Data Loss Prevention Year: 2019 Language: English Genre: Educational: Networking administration Skill Level: Beginner Price: - - Files: MP4 (+ Slides .PDF, Subtitles .SRT) Time: 02:01:28 Video: AVC, 1280 x 720 (1.778) at 30.000 fps, 200 kbps Audio: AAC at 96 Kbps, 2 channels, 48.0 KHz Organization’s data is at a greater risk of data loss than ever before. Workloads are moving to the cloud, volumes of data are increasing. Learn to develop a threat model and to deploy solutions to protect against malicious and accidental data loss.. Data loss is an increasing problem with network perimeters disappearing and more data moving to cloud-based services. In this course, Getting Started with Data Loss Prevention, you will learn how to mitigate this threat in your organization. First, you will see how to define a threat model for data loss. Next, you will explore how to identify the key data loss vectors including endpoint, email, cloud, and web data loss. Finally, you will discover less obvious data loss vectors such as social media and physical loss. When you’re finished taking this course, you will have mastered the approach for preparing a data loss prevention strategy and have knowledge of various technologies available to help reduce the risk in your organization. Lessons: 1. Course Overview 01. Course Overview 2. What Is Data Loss Prevention and Why You Need It? 02. Module Overview 03. Malicious and Accidental Data Loss 04. Why DLP Importance Is Growing 05. The Perimeter-less Network and DLP Risks 06. Laws and Regulations 07. Course Outline 08. Globomantics DLP Case Study 09. Module Summary 3. Creating Your Data Loss Threat Model 10. Module Overview 11. Selecting a Threat Model Methodology 12. Installing the Microsoft Threat Modeling Tool 13. Demo: Creating a Threat Model 14. Globomantics DLP Threats 15. Real World DLP Examples 16. Module Summary 4. Protecting from Endpoint Device Data Loss 17. Module Overview 18. Endpoint Threat Vectors 19. Full Disk Encryption (FDE) 20. Device Hardening 21. Demo: Using InTune to Enforce Policies 22. Module Summary 5. Protecting from Email Based Data Loss 23. Module Overview 24. Data Loss Risks from Email 25. Accidental Email Data Loss 26. Malicious Email Data Loss 27. Configuring a DLP Policy 28. Module Summary 6. Safeguarding from Cloud and Web-based Data Loss 29. Module Overview 30. Cloud-based Data Loss Risks 31. Data Exfiltration Targets 32. Demo: Cloud App Security 33. Module Summary 7. Protecting from Social Media Data Loss 34. Module Overview 35. Real World DLP Examples 36. Preventing Social Media Data Loss 37. Module Summary 8. Considering Physical Data Loss Risks 38. Module Overview 39. Physical Data Loss Examples 40. Preventing Physical Data Loss 41. Module Summary 9. Building Your Roadmap for Starting with Data Loss Prevention 42.Roadmap for Starting with Data Loss Prevention 43.Further Learning Our members see more. Join us! ------------- Our members see more. Join us!