Data Loss Prevention (DLP) - Security breaches under control
4.0 (9 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
67 students enrolled
Wishlisted Wishlist

Please confirm that you want to add Data Loss Prevention (DLP) - Security breaches under control to your Wishlist.

Add to Wishlist

Data Loss Prevention (DLP) - Security breaches under control

A vendor-neutral introduction to DLP with hands-on labs and examples. Network security in action!
4.0 (9 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
67 students enrolled
Created by Marious Kuriata
Last updated 5/2017
Curiosity Sale
Current price: $10 Original price: $35 Discount: 71% off
30-Day Money-Back Guarantee
  • 2 hours on-demand video
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
What Will I Learn?
  • Designs of Data Loss Prevention systems
  • Basic and advanced features of DLP
  • Create a basic regular expression (Regex)
  • Implement your own DLP system using a VM
  • Create and implement content-aware policies
  • Learn how to protect against data leaks
  • Integrate DLP with Microsoft Active Directory
View Curriculum
  • Basic understanding of IT security concepts
  • Understanding of general networking terms
  • Basic understanding of virtualization and servers

Did you know that almost 50% of employees transfer business files to a private laptop? Is there anything we can do about it? Yes - implement a Data Loss Prevention (DLP) system to address potential data loss or theft on Windows, Mac OS X, Linux, and mobile devices. Protect your sensitive files, clients' information, credit card numbers, and more.

With a DLP system you decide when, from where, and by whom data can or cannot be accessed and copied! 

About this course: This is a vendor-neutral introductory course providing a high-level overview of DLP systems, architecture, components, and features. Hands-on labs included!

What I will learn: How to start with a DLP system, create a basic policy, understand DLP components, and even create your first regular expression (regex).

Special topics: Even though this is a vendor-neutral course, I show you a lot of real world examples and DLP systems that you can try at home - for free!

Join this course to learn:

  • Data Loss Prevention (DLP) architecture
  • Endpoint vs Network protection
  • Data at rest, Data in motion, Data in use
  • Deploy your own DLP system in minutes using a virtual machine
  • See a lot of examples and real world applications (e.g. blocking uploads, sharing programming codes)
  • Write your first regular expression
  • Learn about more advanced DLP features (SSL interception, OCR, integration with Active Directory)

Join now and see what a DLP system can do for you and your company! Protect USB drives, clipboard, network drives, email clients, Skype, and more. Make sure nobody can share or copy your internal files and data ever again.

This is a vendor-neutral course that will make you ready to start with any DLP system, including enterprise solutions from Symantec or McAfee. Hands-on labs are based on two DLP systems: DeviceLock and EndpointProtector.

Join now!

Who is the target audience?
  • Anyone looking for a high-level overview of DLP systems
  • Engineers and managers interesting in implementing DLP
Students Who Viewed This Course Also Viewed
Curriculum For This Course
31 Lectures
Introduction to Data Loss Prevention (DLP) systems
8 Lectures 22:39

Why is this course really unique? What to expect and how to start.

Preview 03:51

You will understand what a DLP system is designed to do and how it can protect the network.

Why do we Need a DLP Solution?

Install your own DLP system in minutes for free.

Implement a Test DLP System for Free!

The easiest way to understand a new topic is to see it in action!

DLP Systems in Action

A few additional reasons why we need a DLP solution.

Did you Know That 50% of Users...

Understand how DLP can protect your sensitive data.

Preview 06:11

Data in motion, data in use, and data at rest.

Quick Overview of Data Types

Let's Summarize this Chapter
DLP in Action
7 Lectures 23:23
What to Expect in This Section

Learn how to deploy an Endpoint DLP system using a dedicated Agent.

Endpoint DLP Architecture

Another lab showing DLP in action, this time - file upload of clients' data!

Let's Block the Leakage of Client Data

In this lab you will see a sample policy to block the leakage of a programming file.

Blocking an SQL Query - Lab

An enterprise DLP system with Proxy and Email servers.

Network DLP Solutions

Learn why it is not a good idea to block everything!

Monitor or Block... Let's see!

Let's Summarize This Chapter
Interesting Features of DLP
6 Lectures 17:30
What to Expect in This Section

Learn how to monitor copy & paste actions of end users.

Clipboard Monitoring

Use preconfigured rules to catch data leaks of credit card details, phone numbers, email databases, and more.

Built-in Rules: Passport, ID, Credit Card Number, Email Addresses...

A sample DLP report you want to have.

Detailed Reporting in DLP

OCR and Other Features

Even More Features: Protect Printing, VM, and More!
More About DLP
6 Lectures 19:30
What to Expect in This Section

Learn how big companies design their systems: Symantec, McAfee...

Enterprise DLP

Create your own patterns using regexp.

Introduction to Regular Expressions

Create your own patterns using regexp.

Examples of RegEx

Learn what to avoid when tweaking DLP systems.

False Positives, False Negatives

Let's Summarize the Course
Supplementary Videos
4 Lectures 21:48
How to Use Virtual Box

Installing Windows Server and Windows 10

Introduction to Active Directory

Group Policy in Action
About the Instructor
Marious Kuriata
4.2 Average rating
8,251 Reviews
95,354 Students
28 Courses
IT Exam Practice, Network Engineer and Instructor

Hi, my name is Marious. I have been working in IT for 14 years (web design, networking, security, tutoring). I currently work as a Cisco Security Engineer in a support IT Company in London and I run my own training company. My courses/certifications: MCSE, MCSA, MCTS, MCP, Cisco CCNA, CCNP, CCNA Security, CCSP, Zyxel Security Professional, Postgraduate studies in networking & security. A Master's Degree in Human Resources.

12 years of experience in IT. This has included designing, troubleshooting and installing networks, Cisco routers, switches, access points and firewalls (ASA Firewalls, Aironet, VLANs, routing protocols RIP, OSPF, EIGRP, BGP, spanning tree, VPNs, Cyberoam, IPS/IDS, Riverbed), Previous experience includes Microsoft systems, IT Manager, Technical Trainer (Cisco, Comptia, Microsoft) and Private Tutor.

CCNA Cisco Certified Network Associate (2009)

CCNP Cisco Certified Network Professional (2010)

CCNA_SEC Cisco Certified Network Associate Security (2012)

CCNA_ASA Cisco ASA Firewalls Specialist: Security and VPNs (2013)

CCSP (CCNP Sec) – Cisco Certified Security Specialist (2013)

ZCNP ZyXEL Certified Network Professional (2012)

MCSE Microsoft Certified Systems Engineer (2011)

MCP Microsoft Certified Professional (Windows Server) (2009)

MCTS Microsoft Certified Technology Specialist (Vista) (2009)

MCSA Microsoft Certified Systems Administrator (2010)

Training in ERP management, Cisco Networking Academy CCNA (distinction)

Microsoft Courses (Windows Server 2003, SQL, XP, ISA Server, Exchange Server)