Data Security
Showing 13–24 of 50 results
Data Security Champion: SQL Injection and Prevention
This course will teach you the essentials about SQL Injection attacks, equipping you with critical skills for modern data management.
Designing/Deploying Exchange 2016: Compliance & Archiving
This course will teach you about Exchange 2016 compliance and archiving. Along with other courses in the series, this course will help to prepare you for the Microsoft 70-345 exam.
Detecting Anomalies and Events with Winlogbeat
Winlogbeat is an open-source log collector that ships Windows Event Logs to Elasticsearch or Logstash. In this course, you will learn the setup, configuration, and validation of Winlogbeat in an enterprise environment.
Execution with Unicorn
Are you looking for a tool that simplifies the process of exploiting Windows hosts using a variety of techniques? In this course, you will learn execution using Unicorn.
IBM Guardium Data Protection Foundations
Guardium discovers and classifies sensitive data and provides real time data monitoring and advanced user behavior analytics to discover unusual data activity. This course provides procedures and practices to monitor and protect sensitive data.
Identity Management, Authentication and Access Control with pfSense
pfSense provides network firewall, VPN, and other services to users and network operators. In this course, you'll learn the setup, configuration, and validation of pfSense in an enterprise environment.
Impact with Caldera
Impact is the last step on a red team simulation, where adversaries cause disruption in the system to accomplish their objectives. In this course, you will learn impact using Caldera.
Microsoft Information Protection and Compliance: Implementing Data Loss Prevention (DLP)
Securing data is a core skill, and data loss prevention (DLP) sits at the heart of that skill. This course teaches you how to work with Microsoft Purview and other tools to implement DLP, and prepare you for the DLP section of the SC-400 exam.
Microsoft Information Protection and Compliance: Implementing Information Protection
Unlock data protection mastery with this course. Learn how to manage sensitive info, classify data, apply label policies, and implement email encryption in Microsoft Purview.
Microsoft Information Protection and Compliance: Managing Insider and Privacy Risk
Most companies are aware of threats posed by bad actors outside of the organization, but is your company prepared for threats posed by insiders?
Microsoft Information Protection and Compliance: Monitoring with Microsoft Purview
This course will teach you how to plan and manage regulatory requirements, master eDiscovery and content search techniques, and effectively manage and analyze audit logs and reports in Microsoft Purview.
Microsoft Purview: Mitigating Insider Risks in Microsoft 365
Learn to mitigate insider risks in Microsoft 365 and create barriers to safeguard sensitive information, plan and enforce risk policies, investigate activities, and use advanced analytics for risk assessment.