Data Protection - Abhiraksha.com
Data Protection

Course Overview

This course provides in-depth training to design, implement,configure, and use Endpoint Data Loss Prevention in order to protect business confidential data from intentional or unintentional leakage. We will discuss and explain how to monitor day-to-day end-user data transfer actions, such as emailing, web posting, printing, clipboards, screen captures, device control and uploading to the cloud applications such as g-drive, one-drive, dropbox etc.

The Fact and Risk

Today technology has made our job a lot easier with the help of tools like removable media (pen-drive/ external HDD), Smart phone, tablets  & laptop. 

Not just that cloud apps such as salesforce, Microsoft O365, Google G-Suite, GITHUB, ONE-DRIVE, GDRIVE, DROPBOX etc, allow us to Synchronize our personal as well as business data across multiple set of devices so that it can accessed anytime anywhere. 

This ease of anytime anywhere comes with a great amount of RISK. What if we lose our portable devices which are carrying business project documents, sales reports, financial details, customer records, banking apps along with all important credentials? Employees can easily leak information to competitors and at times unintentionally as well such as wanting to send it to Amit Sharma but went to Amit Verma.

Technologies like Encryption and Data Loss Prevention help to minimize the risk from loss as well as leak.

Training Prerequisites

  • Working knowledge of Microsoft Windows administration and Active Directory fundamentals.
  • Network Communication fundamentals and TCP/IP addressing.
  • General understanding of Internet communication, email flow and DNS fundamentals.

Module 1 – Data Loss Prevention with McAfee or Forcepoint Endpoint Software

Course Duration – 24 Hours

Training Content – How to deploy, configure and manage McAfee Drive Encryption 

  • Endpoint Data Loss Prevention (DLP) Solution Overview and fundamentals.
  • Discussing DLP approach.
  • DLP software centralized management.
  • Planning DLP Endpoint Deployment and preparing the environment.
  • Installing  Data Loss Prevention Endpoint Software.
  • How to Classify Sensitive Content.
  • Content Fingerprinting and Classification Criteria Rules.
  • Configuring Data Protection policy rules.
  • Endpoint Data Discovery.
  • Monitoring and Reporting
  • Managing DLP Incidents 
  • Basic Troubleshooting
  • Backup and Recovery

Module 2 – Disk Encryption with McAfee Software

Drive Encryption is full disk encryption software that helps protect data on Microsoft Windows tablets, laptops, and desktop PCs to prevent the loss of sensitive data, especially from lost or stolen equipment. It is designed to make all data on a system drive unintelligible to unauthorized persons, which in turn helps meet compliance requirements.

Course Duration – 24 Hours

Training Content – How to deploy, configure and manage McAfee Drive Encryption

  • Understand Encryption Technology.
  • Overview of centralized deployment & McAfee management software named as McAfee® ePolicy Orchestrator® (McAfee ePO™)
  • McAfee Drive Encryption Overview.
  • McAfee Drive Encryption Deployment Planning.
  • Integration with Active Directory & Single Sign-On.
  • McAfee Drive Encryption Users and Policies.
  • Deployment of Drive Encryption to User Systems.
  • Troubleshooting McAfee Drive Encryption Problems
  • Recovery when System  is unable to boot.
  • Recovery when user is unable to login 
  • McAfee Drive Encryption Dashboards and Queries
  • Offline Activation
  • Upgrading McAfee Drive Encryption Package
  • Uninstallation of Drive Encryption from User System.
  • Disaster Recovery with tools like DETech.
Related Training

Information Security Management System ISMS

Information Security Management System (ISMS)

Implementer Professional for BS ISO/ IEC 27001:2013 Information Security Management System (ISMS)The International Organization for Standardization (ISO) is a global body that collects and manages various standards for different disciplines. The ISO 27001 standard is designed to function as a ...
Read More
Ethical-Hacking

Penetration Testing and Ethical Hacking

Course Overview Ethical hacking involves penetration testing where trained or experienced professionals attempt to penetrate a IT network or computer system as a service to the owner of the system to find security vulnerabilities which a hacker may be able ...
Read More
Network-Security-Abhiraksha.com

Network Security With Checkpoint Firewall

Course Overview We live in an age where technology is constantly changing and cyber threats are becoming harder to detect. Today unknown attacks too are rising in the count of thousands everyday and attacking every size of the organization. Organizations ...
Read More
System Protection - Abhiraksha.com

System Protection From Malwares

Course Duration - 18 hoursOur System Security training program will provide in-depth learning of protecting endpoint systems (desktop, laptop & server) with McAfee Endpoint security software from malware attacks.This course provides an in-depth understanding of the tasks crucial to set ...
Read More
Security Analyst - Abhiraksha.com

Security Analyst

Cybersecurity Analyst is one of the high demand job roles by the reputed organizations for their security positions.Course OverviewA security analyst is a member of network security operations team  and is responsible to monitor as well as perform cyber incident  ...
Read More

Network Access Control

Organizations and individuals today are surrounded by devices from laptops, smartphones and tablets to servers, virtual instances, IoT devices and industrial systems of all kinds. Unknown, Unprotected and Vulnerable systems as well as devices significantly expand your attack surface. Organizations today ...
Read More
Data Protection - Abhiraksha.com

Data Protection

Course OverviewThis course provides in-depth training to design, implement,configure, and use Endpoint Data Loss Prevention in order to protect business confidential data from intentional or unintentional leakage. We will discuss and explain how to monitor day-to-day end-user data transfer actions, ...
Read More

IT and Cybersecurity Fundamentals

Course Overview This course helps to learn information technology fundamentals which are outlined below and creates a broader understanding of IT concepts making it ideal for non-technical professionals such as beginners in this domain whether passed from school or graduated ...
Read More