We may earn an affiliate commission when you visit our partners.
Course image
Course image
Coursera logo

Data Management with Azure

Implement Compliance Controls

Goran Kliček

Confidential data stored within a Microsoft SQL Server or Azure SQL Database should be classified and kept safe within the database. This classification allows the SQL Server users, as well as other applications, to know the sensitivity of the data that is being stored. Classification and protection of the data stored in the database is a must – implementation of row-level security can restrict row-level access based on a user's identity, role, or execution context and with the implementation of Dynamic Data Masking you can limit sensitive data exposure to non-privileged users. Using the Azure portal, you can identify, classify, and protect your sensitive data.

Read more

Confidential data stored within a Microsoft SQL Server or Azure SQL Database should be classified and kept safe within the database. This classification allows the SQL Server users, as well as other applications, to know the sensitivity of the data that is being stored. Classification and protection of the data stored in the database is a must – implementation of row-level security can restrict row-level access based on a user's identity, role, or execution context and with the implementation of Dynamic Data Masking you can limit sensitive data exposure to non-privileged users. Using the Azure portal, you can identify, classify, and protect your sensitive data.

In this intermediate-level guided project "Data Management with Azure: Implement Compliance Controls”, you will create an Azure SQL Server and set up sample database. Using sample database, sensitive data will be classified and “protected” using row level security and dynamic data masking. You will also learn what is and how to use Microsoft Defender for SQL.

The requirement for this project is having a free and active Azure account and an active Azure subscription. You will be given short instructions on how to get them in the first task.

Enroll now

What's inside

Syllabus

Project Overview
In this Guided Project you will create an Azure SQL Server and set up a sample database which will be used to classify and protect sensitive data using row-level security and dynamic data masking. You will also learn what is and how to use Microsoft Defender for SQL.

Good to know

Know what's good
, what to watch for
, and possible dealbreakers
Offers learners security fundamentals of data management
Enabled by Microsoft Defender for SQL
Focuses on data integrity and protection using security mechanisms
Serves as a comprehensive guide to data management with Azure

Save this course

Save Data Management with Azure: Implement Compliance Controls to your list so you can find it easily later:
Save

Activities

Coming soon We're preparing activities for Data Management with Azure: Implement Compliance Controls. These are activities you can do either before, during, or after a course.

Career center

Learners who complete Data Management with Azure: Implement Compliance Controls will develop knowledge and skills that may be useful to these careers:
Software Engineer
Software Engineers design, develop, and maintain software applications. They work on a variety of projects, from small business applications to large enterprise systems. Completing this course will provide you with a foundation in data classification and protection. By understanding how to identify and protect sensitive data, you will be better equipped to build secure software applications.
Compliance Auditor
Compliance Auditors evaluate an organization's compliance with laws, regulations, and standards. They identify and assess risks and make recommendations for improvement. Completing this course will provide you with a foundation in data classification and protection. By understanding how to identify and protect sensitive data, you will be better equipped to work with sensitive data in your role.
Information Governance Analyst
Information Governance Analysts develop and implement policies and procedures to manage an organization's information assets. They also oversee the organization's information governance activities. Completing this course will provide you with a foundation in data classification and protection. By understanding how to identify and protect sensitive data, you will be better equipped to work with sensitive data in your role.
Machine Learning Engineer
Machine Learning Engineers design, build, and deploy machine learning models. They use machine learning to solve business problems, such as fraud detection and customer segmentation. Completing this course will provide you with a foundation in data classification and protection. By understanding how to identify and protect sensitive data, you will be better equipped to work with sensitive data in your role.
Database Administrator
Database Administrators are responsible for the installation, configuration, maintenance, and performance monitoring of database management systems. Completing this course will help build a foundation in using Microsoft SQL Server and Azure SQL Database, which are commonly used by Database Administrators. By learning how to classify and protect sensitive data using row-level security and dynamic data masking, you will gain skills that are highly relevant to this role.
Information Security Analyst
Information Security Analysts plan and implement security measures to protect an organization's information systems and data. Completing this course will provide you with a foundation in data classification and protection. By understanding how to identify and protect sensitive data, you will be better equipped to work with sensitive data in your role.
Risk Analyst
Risk Analysts identify, assess, and mitigate risks. They work to protect organizations from financial losses, reputational damage, and other threats. Completing this course will provide you with a foundation in data classification and protection. By understanding how to identify and protect sensitive data, you will be better equipped to work with sensitive data in your role.
Data Scientist
Data Scientists use data to solve business problems. They collect, clean, and analyze data to identify trends and patterns. They then use this information to develop predictive models and make recommendations. Completing this course will provide you with a foundation in data classification and protection. By understanding how to identify and protect sensitive data, you will be better equipped to work with sensitive data in your role.
Security Analyst
Security Analysts identify, assess, and mitigate security risks. They work to protect organizations from cyber threats and data breaches. Completing this course will provide you with a foundation in data classification and protection. By understanding how to identify and protect sensitive data, you will be better equipped to work with sensitive data in your role.
Privacy Analyst
Privacy Analysts identify and assess privacy risks, and they develop and implement privacy policies and procedures. They also oversee an organization's privacy compliance activities. Completing this course will provide you with a foundation in data classification and protection. By understanding how to identify and protect sensitive data, you will be better equipped to work with sensitive data in your role.
Data Protection Officer
Data Protection Officers are responsible for ensuring that an organization complies with data protection laws and regulations. They develop and implement data protection policies and procedures, and they oversee the organization's data protection activities. Completing this course will provide you with a foundation in data classification and protection. By understanding how to identify and protect sensitive data, you will be better equipped to work with sensitive data in your role.
Database Security Engineer
Database Security Engineers design and implement security measures to protect databases from unauthorized access and data breaches. This course may be useful for aspiring Database Security Engineers as it provides an introduction to data classification and protection. By understanding how to classify and protect sensitive data, you will be better equipped to design and implement effective security measures for databases.
Data Analyst
Data Analysts collect, clean, and analyze data to identify trends and patterns. They use this information to make recommendations and improve decision-making. This course can be useful for aspiring Data Analysts as it provides a foundation in data classification and protection. By understanding how to identify and protect sensitive data, you will be better equipped to work with sensitive data in your role.
Cloud Security Engineer
Cloud Security Engineers design and implement security measures to protect cloud-based systems and data. This course may be useful for aspiring Cloud Security Engineers as it provides an introduction to data classification and protection. By understanding how to classify and protect sensitive data, you will be better equipped to design and implement effective security measures for cloud-based systems.
Data Engineer
Data Engineers design, build, and maintain data pipelines and infrastructure. They ensure that data is properly stored, processed, and analyzed. This course may be helpful for Data Engineers as it provides an introduction to data classification and protection. By understanding how to classify and protect sensitive data, you will be better equipped to design and build secure data pipelines.

Reading list

We've selected 12 books that we think will supplement your learning. Use these to develop background knowledge, enrich your coursework, and gain a deeper understanding of the topics covered in Data Management with Azure: Implement Compliance Controls.
Covers the basics of database security with Azure SQL Database, including how to create and manage database security policies. It also covers how to use SQL Server Management Studio and Azure Data Studio to manage your database security policies.
Covers the basics of Microsoft Defender for SQL, including how to install and configure Microsoft Defender for SQL. It also covers how to use Microsoft Defender for SQL to protect your databases from threats.
Collection of recipes for solving common Transact-SQL problems. It covers a wide range of topics, including data manipulation, data retrieval, and database administration.
Data Classification: Concepts, Techniques and Applications provides an in-depth look at data classification techniques, including those used in row-level security and dynamic data masking. It valuable resource for understanding the theoretical foundations of these technologies.
Dynamic Data Masking with SQL Server provides a comprehensive overview of dynamic data masking in SQL Server. It covers both the theoretical foundations and practical implementation, making it a valuable resource for anyone interested in this technology.
Offers a comprehensive overview of data security and privacy in the cloud, covering topics such as data encryption, access control, and regulatory compliance. It provides a broader understanding of data security principles that apply beyond Azure.
Focuses on identity and access management, as well as security services in Azure. It can provide additional insights into securing data and applications in the Azure environment.
Security Engineering: A Guide to Building Dependable Distributed Systems provides a comprehensive overview of security engineering principles. It covers a wide range of topics, including data protection, authentication, and authorization. It valuable resource for anyone interested in learning more about security engineering.
Database Systems: The Complete Book comprehensive textbook on database systems. It covers a wide range of topics, including data classification, security, and privacy. It valuable resource for anyone interested in learning more about database systems.
Microsoft Azure Security Center: Administration provides a comprehensive overview of the Microsoft Azure Security Center. It covers a wide range of topics, including security monitoring, threat detection, and incident response. It valuable resource for anyone interested in learning more about the Microsoft Azure Security Center.

Share

Help others find this course page by sharing it with your friends and followers:

Similar courses

Here are nine courses similar to Data Management with Azure: Implement Compliance Controls.
SQL Server 2016 New Features for Developers
Most relevant
Secure Your Data at Rest
Most relevant
EssentialSQL: Stored Procedures Unpacked - Code in TSQL
Most relevant
Implement Data Auditing with Azure Data Lake
Most relevant
Programming SQL Server Database Stored Procedures
Most relevant
Configure and Manage Azure Key Vault
Most relevant
Troubleshooting SQL Server Performance with sp_WhoIsActive
Most relevant
Azure Database Administrator Associate
Most relevant
Automate Data Workflows with SQL Server Stored Procedures
Most relevant
Our mission

OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.

Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.

Find this site helpful? Tell a friend about us.

Affiliate disclosure

We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.

Your purchases help us maintain our catalog and keep our servers humming without ads.

Thank you for supporting OpenCourser.

© 2016 - 2024 OpenCourser