Companies Home Search Profile

Data Loss Prevention (DLP) in the modern Enterprise!

Focused View

Risal Nasar

2:05:17

13 View
  • 1 - Introduction.mp4
    00:25
  • 2 - DLPNotes.pdf
  • 2 - Notes.html
  • 3 - Data Loss Incidents.mp4
    05:44
  • 4 - Types of Sensitive Data.mp4
    06:18
  • 5 - Data Formats and Data Transfer Channels.mp4
    03:15
  • 6 - Sensitive Data Detection Methods.mp4
    14:42
  • 7 - DLP Deployment Types.mp4
    09:23
  • 8 - DLP Solution Types.mp4
    03:55
  • 9 - Data Loss is a Business Risk and Data Loss Prevention is primarily a Process.mp4
    03:42
  • 10 - Data Security Policy.mp4
    04:51
  • 11 - DLP Solution Selection Process.mp4
    03:58
  • 12 - DLP Organizational Structure People Structure.mp4
    01:47
  • 13 - DLP High Level Processes.mp4
    09:35
  • 14 - Regular Expressions Introduction.mp4
    00:15
  • 15 - Metacharacters.mp4
    01:36
  • 16 - 3SquareBracketsandCaretWithin.txt
  • 16 - Square Brackets and Caret Within.mp4
    04:46
  • 17 - 4CaretDollarSignRoundBracketsCurleyBrackets.txt
  • 17 - Caret Dollar Sign Round Brackets Curley Brackets.mp4
    04:58
  • 18 - 5Pipe.txt
  • 18 - Pipe.mp4
    02:32
  • 19 - 6PlusStar.txt
  • 19 - Plus Star.mp4
    03:46
  • 20 - 7Dot.txt
  • 20 - Dot.mp4
    02:51
  • 21 - 8QuestionMarkBackSlash.txt
  • 21 - Question Mark Back Slash.mp4
    02:21
  • 22 - Challenge 1.html
  • 23 - Challenge 1 Walkthrough.mp4
    00:57
  • 24 - Challenge 2.html
  • 25 - Challenge 2 Walkthrough.mp4
    00:59
  • 26 - Challenge 3.html
  • 27 - Challenge 3 Walkthrough.mp4
    00:54
  • 28 - Challenge 4.html
  • 29 - Challenge 4 Walkthrough.mp4
    00:29
  • 30 - Challenge 5.html
  • 31 - Challenge 5 Walkthrough.mp4
    00:50
  • 32 - Challenge 6.html
  • 33 - Challenge 6 Walkthrough.mp4
    02:36
  • 34 - Challenge 7.html
  • 35 - Challenge 7 Walkthrough.mp4
    01:19
  • 36 - Challenge 8.html
  • 37 - Challenge 8 Walkthrough.mp4
    00:57
  • 38 - Challenge 9.html
  • 39 - Challenge 9 Walkthrough.mp4
    00:55
  • 40 - Challenge 10.html
  • 41 - Challenge 10 Walkthrough.mp4
    00:55
  • 42 - Challenge 11.html
  • 43 - Challenge 11 Walkthrough.mp4
    01:29
  • 44 - Challenge 12.html
  • 45 - Challenge 12 Walkthrough.mp4
    01:27
  • 46 - Challenge 13.html
  • 47 - Challenge 13 Walkthrough.mp4
    02:20
  • 48 - Email Address.html
  • 48 - mockdata1.txt
  • 49 - Email Address Walkthrough.mp4
    04:34
  • 50 - IP Address.html
  • 50 - mockdata1.txt
  • 51 - IP Address Walkthrough.mp4
    02:55
  • 52 - Bitcoin Address.html
  • 52 - mockdata1.txt
  • 53 - Bitcoin Address Walkthrough.mp4
    01:23
  • 54 - URL Address.html
  • 54 - mockdata6.txt
  • 55 - URL Address Walkthrough.mp4
    02:29
  • 56 - Extract data from JSON Files.html
  • 56 - mockdata7json.zip
  • 57 - Extract data from JSON Files Walkthrough.mp4
    02:58
  • 58 - Extract data from XML files.html
  • 58 - mockdata8.zip
  • 59 - Extract data from XML files Walkthrough.mp4
    03:11
  • 60 - Congratulations.mp4
    00:23
  • 61 - AllCoursesfromRisalNasarGithubPage.pdf
  • 61 - Bonus.mp4
    00:37
  • 62 - Feedback Time.html
  • Description


    The right way to implement Data Security in modern organizations.

    What You'll Learn?


    • Key Concepts in Data Loss Prevention
    • Sensitive Data Types
    • Data Loss Prevention (DLP) Detection Methods
    • Data Loss Prevention (DLP) Deployment Types
    • Data Loss Prevention (DLP) Solution Types and how to select the best solution for the Organization
    • Data Loss Prevention (DLP) Prerequisites
    • Data Loss Prevention (DLP) Organizational Structure
    • Data Loss Prevention (DLP) Processes
    • Key Concepts in Regular Expressions
    • Confidence to author Regular Expressions
    • Regular Expressions (Regex) - How to formulate them
    • How to use regular expressions to search and find almost anything under the sun! (textual data ofcourse ;) )

    Who is this for?


  • Anyone interested in learning about Data Loss Prevention (DLP) Concepts
  • Anyone interested in Cyber Security, IT Risk Management, IT Audit
  • Anyone interested in learning about Regular Expressions (Regex)
  • Anyone interested in developing the ability to write own Regular Expressions (Regex)
  • What You Need to Know?


  • Basic understanding of IT within an Enterprise
  • More details


    Description

    Welcome to the Data Loss Prevention (DLP) in the Enterprise Course! The course comprehensively covers the main concepts in Data Loss Prevention and explains the factors required for modern organizations to successfully implement a Data Loss Prevention Program.

    Topics Covered:

    • Data Loss Incidents

    • Types of Sensitive Data

    • Data Formats and Transfer Channels

    • Sensitive Data Detection Methods

    • DLP Deployment Types

    • DLP Solution Types

    • Data Loss is a Business Risk

    • DLP is primarily a Process

    • Data Security Policy

    • DLP Selection Process

    • DLP Organization Structure (People Structure)

    • DLP High Level Processes



    Additionally, this course explains the basic concepts of regular expressions and how they could be used for pattern matching to match almost any kind of textual data.

    The Regex sessions are structured as below:

    • Basic Concepts - Metacharacters and their usage.

    • Challenges and Walkthrough - Practical Challenges for you to attempt your skills at Regular Expressions. Detailed walk through of solution. Examples include different kinds of data in table delimited format, json and xml.


    By the end of the course, you would be confident to create your own regular expressions!


    Happy Learning and All the Best!

    -----

    Topic Background: What is DLP?

    Data loss prevention (DLP), is defined as technologies which perform both content inspection and contextual analysis of data sent via messaging applications such as email and instant messaging, in motion over the network, in use on a managed endpoint device, and at rest in on-premises file servers or in cloud applications and cloud storage. These solutions execute responses based on policy and rules defined to address the risk of inadvertent or accidental leaks or exposure of sensitive data outside authorized channels.

    DLP technologies are broadly divided into two categories – Enterprise DLP and Integrated DLP. While Enterprise DLP solutions are comprehensive and packaged in agent software for desktops and servers, physical and virtual appliances for monitoring networks and email traffic, or soft appliances for data discovery, Integrated DLP is limited to secure web gateways, secure email gateways, email encryption products, enterprise content management platforms, data classification tools, data discovery tools, and cloud access security brokers.


    What are Regular Expressions?

    Regular Expression, or regex or regexp in short, is extremely and amazingly powerful in searching and manipulating text strings, particularly in processing text files. One line of regex can easily replace several dozen lines of programming codes.

    Regex is supported in all the scripting languages (such as Perl, Python, PHP, and JavaScript); as well as general purpose programming languages such as Java; and even word processors such as Word for searching texts. Getting started with regex may not be easy due to its geeky syntax, but it is certainly worth the investment of your time.

    Regular expression synax varies slightly between languages but for the most part the details are the same. Some regex implementations support slightly different variations on how they process as well as what certain special character sequences mean.

    Who this course is for:

    • Anyone interested in learning about Data Loss Prevention (DLP) Concepts
    • Anyone interested in Cyber Security, IT Risk Management, IT Audit
    • Anyone interested in learning about Regular Expressions (Regex)
    • Anyone interested in developing the ability to write own Regular Expressions (Regex)

    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    Trainer with 11 plus years of experience in Cyber Security, Technology Risk Management, Data Analytics and Automation spanning Banking, Insurance and Technology industries.Main areas of experience:• Programmatic Data Analysis, Data Wrangling and extraction of Relevant Data Points for Management Action (Python, Pandas, Matplotlib, SQL, Excel Macros)• Data Visualizations (Microsoft Power BI, Microsoft PowerPoint and Excel, Python Matplotlib)• Containerization of Applications for Deployment to Cloud Platforms (Docker, Kubernetes)• Experienced with Cloud Platforms and Provisioning Tools (Azure, AWS, Terraform)• Scripting, Programming and Automation (Python, Powershell, Bash, C, C++, Java, SQL, PHP)• Vulnerability Assessment, Triage and Remediation (Nexpose)• Detailed and Thorough Proof-Of-Concept (POC) and Proof-Of-Value (POV) Implementations of Security Solutions• Data Loss Prevention (DLP) Implementation (Symantec DLP, Microsoft IRM, Google Drive Access Control)• Cloud Access Security Broker (CASB) (Netskope, McAfee SkyHigh, Cisco Cloudlock, BitGlass)• Firewall Network Security Process Implementation (Algosec)• Version Control Platforms (GitHub, GitLab)• Issue, Project Tracking and Team Collaboration Tools (JIRA, Confluence)• Cloud Document Collaboration Platform Security (Google GSuite, Microsoft 365)• Web Application Security Implementation (OWASP Application Security Verification Standards)• Application Security Assessment and Remediation• Assessment of Compliance against Institutional and Regulatory Policies, Standards and Guidelines (MAS Technology Risk Management Guidelines – TRMG, Personal Data Protection Act - PDPA)
    Students take courses primarily to improve job-related skills.Some courses generate credit toward technical certification. Udemy has made a special effort to attract corporate trainers seeking to create coursework for employees of their company.
    • language english
    • Training sessions 41
    • duration 2:05:17
    • Release Date 2024/04/14