Data Loss Prevention (DLP) - Security breaches under control
4.1 (100 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
462 students enrolled

Data Loss Prevention (DLP) - Security breaches under control

A vendor-neutral introduction to DLP with hands-on labs and examples. Network security in action!
4.1 (100 ratings)
Course Ratings are calculated from individual students’ ratings and a variety of other signals, like age of rating and reliability, to ensure that they reflect course quality fairly and accurately.
462 students enrolled
Created by Marious Kuriata
Last updated 7/2020
English
English [Auto]
Current price: $23.99 Original price: $34.99 Discount: 31% off
5 hours left at this price!
30-Day Money-Back Guarantee
This course includes
  • 2 hours on-demand video
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
Training 5 or more people?

Get your team access to 4,000+ top Udemy courses anytime, anywhere.

Try Udemy for Business
What you'll learn
  • Designs of Data Loss Prevention systems
  • Basic and advanced features of DLP
  • Create a basic regular expression (Regex)
  • Implement your own DLP system using a VM
  • Create and implement content-aware policies
  • Learn how to protect against data leaks
  • Integrate DLP with Microsoft Active Directory
Requirements
  • Basic understanding of IT security concepts
  • Understanding of general networking terms
  • Basic understanding of virtualization and servers
Description

Did you know that almost 50% of employees transfer business files to a private laptop? Is there anything we can do about it? Yes - implement a Data Loss Prevention (DLP) system to address potential data loss or theft on Windows, Mac OS X, Linux, and mobile devices. Protect your sensitive files, clients' information, credit card numbers, and more.

With a DLP system you decide when, from where, and by whom data can or cannot be accessed and copied! 

About this course: This is a vendor-neutral introductory course providing a high-level overview of DLP systems, architecture, components, and features. Hands-on labs included!

What I will learn: How to start with a DLP system, create a basic policy, understand DLP components, and even create your first regular expression (regex).

Special topics: Even though this is a vendor-neutral course, I show you a lot of real world examples and DLP systems that you can try at home - for free!

Join this course to learn:

  • Data Loss Prevention (DLP) architecture
  • Endpoint vs Network protection
  • Data at rest, Data in motion, Data in use
  • Deploy your own DLP system in minutes using a virtual machine
  • See a lot of examples and real world applications (e.g. blocking uploads, sharing programming codes)
  • Write your first regular expression
  • Learn about more advanced DLP features (SSL interception, OCR, integration with Active Directory)


Join now and see what a DLP system can do for you and your company! Protect USB drives, clipboard, network drives, email clients, Skype, and more. Make sure nobody can share or copy your internal files and data ever again.

This is a vendor-neutral course that will make you ready to start with any DLP system, including enterprise solutions from Symantec or McAfee. Hands-on labs are based on two DLP systems: DeviceLock and EndpointProtector.

Join now!

Who this course is for:
  • Anyone looking for a high-level overview of DLP systems
  • Engineers and managers interesting in implementing DLP
Course content
Expand all 32 lectures 01:49:42
+ Introduction to Data Loss Prevention (DLP) systems
8 lectures 22:39

Why is this course really unique? What to expect and how to start.

Preview 03:51

You will understand what a DLP system is designed to do and how it can protect the network.

Why do we Need a DLP Solution?
02:33

Install your own DLP system in minutes for free.

Implement a Test DLP System for Free!
02:31

The easiest way to understand a new topic is to see it in action!

DLP Systems in Action
03:14

A few additional reasons why we need a DLP solution.

Did you Know That 50% of Users...
01:19

Understand how DLP can protect your sensitive data.

Preview 06:11

Data in motion, data in use, and data at rest.

Quick Overview of Data Types
02:34
Let's Summarize this Chapter
00:26
+ DLP in Action
7 lectures 23:23
What to Expect in This Section
00:30

Learn how to deploy an Endpoint DLP system using a dedicated Agent.

Endpoint DLP Architecture
07:00

Another lab showing DLP in action, this time - file upload of clients' data!

Let's Block the Leakage of Client Data
07:40

In this lab you will see a sample policy to block the leakage of a programming file.

Blocking an SQL Query - Lab
01:36

An enterprise DLP system with Proxy and Email servers.

Network DLP Solutions
02:00

Learn why it is not a good idea to block everything!

Monitor or Block... Let's see!
03:16
Let's Summarize This Chapter
01:21
+ Interesting Features of DLP
6 lectures 17:30
What to Expect in This Section
00:34

Learn how to monitor copy & paste actions of end users.

Clipboard Monitoring
04:05

Use preconfigured rules to catch data leaks of credit card details, phone numbers, email databases, and more.

Built-in Rules: Passport, ID, Credit Card Number, Email Addresses...
04:24

A sample DLP report you want to have.

Detailed Reporting in DLP
02:14
OCR and Other Features
03:09
Even More Features: Protect Printing, VM, and More!
03:04
+ More About DLP
6 lectures 19:30
What to Expect in This Section
00:22

Learn how big companies design their systems: Symantec, McAfee...

Enterprise DLP
04:09

Create your own patterns using regexp.

Introduction to Regular Expressions
02:40

Create your own patterns using regexp.

Examples of RegEx
08:06

Learn what to avoid when tweaking DLP systems.

False Positives, False Negatives
03:44
Let's Summarize the Course
00:29
+ Supplementary Videos
5 lectures 26:40
How to Use Virtual Box
05:05
Installing Windows Server and Windows 10
01:56
Introduction to Active Directory
09:07
Group Policy in Action
07:07
Ethical Hacking
03:25