logo

IBM Security Course

course overview

download outline

Select Country and City to View dates & book now

Overview

Data security and privacy challengers are never-ending. IBM Guardium Data Protection (Guardium) provides a broad range of data security and protection capabilities that can protect sensitive and regulated data across environments and platforms. It discovers and classifies sensitive data from across an enterprise, providing real-time data activity monitoring and advanced user behavior analytics to help discover unusual data activity.

The course prepares the student to administer Guardium appliances, discover unusual data activity, locate vulnerable data, automate compliance processes, and monitor and protect sensitive data. To proact using Guardium, students complete hands-on lab exercises.

This course is based on Guardium Data Protection version 12.1.

Audience

Database administrators, security administrators, security analysts, security technical architects, and professional services using Guardium Data Protection

Skills Gained

  • Identify the primary functions of Guardium Data Protection
  • Describe key Guardium architecture components
  • Navigate the Guardium user interface and use the command line interface
  • Manage user access to Guardium
  • Build and populate Guardium groups
  • Use system settings and management tolls to manage, configure, and monitor Guardium resources
  • Archive, backup, and restore Guardium data
  • Discover sensitive data and perform vulnerability assessments
  • Use Guardium audit process tools to streamline the compliance process
  • Describe how to apply rule order, logic, and actions to Guardium policies
  • Configure policy rules that process the information that is gathered from database and file servers
  • Create Guardium queries and reports to examine trends and gather data
  • Use Guardium alerts to monitor a data environment

Prerequisites

Students should be knowledgeable about the following topics:

  • Working knowledge of SQL queries for IBM Db2 and other databases
  • Working knowledge of UNIX commands
  • Ability to use UNIX text editor such as vi
  • Data protection standards such as HIPAA, PCI, and GDPR

 

Outline

Learn to use Guardium Data Protection to administer Guardium appliances, discover unusual data activity, locate vulnerable data, automate compliance processes, and monitor and protect sensitive data.

Talk to an expert

Thinking about Onsite?

If you need training for 3 or more people, you should ask us about onsite training. Putting aside the obvious location benefit, content can be customised to better meet your business objectives and more can be covered than in a public classroom. Its a cost effective option. One on one training can be delivered too, at reasonable rates.

Submit an enquiry from any page on this site and let us know you are interested in the requirements box, or simply mention it when we contact you.

All $ prices are in USD unless it’s a NZ or AU date

SPVC = Self Paced Virtual Class

LVC = Live Virtual Class

Please Note: All courses are availaible as Live Virtual Classes

Trusted by over 1/2 million students in 15 countries

Our clients have included prestigious national organisations such as Oxford University Press, multi-national private corporations such as JP Morgan and HSBC, as well as public sector institutions such as the Department of Defence and the Department of Health.