This course will teach you data auditing, data masking, and encrypting data at rest and in transit on azure cloud. Planning secure endpoints, data retention, and archiving strategy we will be implementing in place using the azure cloud portal.
This course will teach you data auditing, data masking, and encrypting data at rest and in transit on azure cloud. Planning secure endpoints, data retention, and archiving strategy we will be implementing in place using the azure cloud portal.
Sensitive data masking should be of prime importance for efficient data governance models to be followed. In this course, Implement Data Auditing with Azure Data Lake, you’ll learn to apply efficient encryption, data masking, and secure endpoints over Azure Cloud Portal for specific services. First, you’ll explore how to design security for source data access. Next, you’ll discover designing security for data policies and standards. Finally, you’ll learn how to authenticate the service principle to mount data lake on Azure DataBricks. When you’re finished with this course, you’ll have the skills and knowledge of the importance of data masking, efficient encryption policies, management of key Vault, and policy-driven data lake architecture.
In this course, you will learn about data masking, data encryption, how to secure endpoints over cloud, and the key benefits of endpoint security.
Before taking this course, you should be familiar with the basics of Azure Cloud.
Data masking is the process of hiding original data with modified figures. The main use of data masking is to protect classified or sensisitve data.
Data encyption is a security method that translates data into another form or code so that only people with access to the decryption key or password can access and read the data. Data encryption is primarily used to protect digital data from malicious or negligent parties.
Endpoint security is the practice of securing endpoints or entry points of end-user devices such as a desktop, laptop, or mobile device from being exploited by malicious attacks.
OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.
Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.
Find this site helpful? Tell a friend about us.
We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.
Your purchases help us maintain our catalog and keep our servers humming without ads.
Thank you for supporting OpenCourser.