IBM Security® Guardium® Data Protection (Guardium) supports a zero trust approach to security. It discovers and classifies sensitive data from across an enterprise, providing real time data activity monitoring and advanced user behavior analytics to help discover unusual activity around sensitive data.
Guardium provides a broad range of data security and protection capabilities that can protect sensitive and regulated data across environments and platforms. This course provides the foundational level processes, procedures, and practices necessary to configure Guardium to monitor and protect sensitive data. Hands-on exercises reinforce the skills learned.
*Note: this course is based upon IBM Security® Guardium® Data Protection v11.4
Objectives
Audience
Database administrators, security administrators, security analysts, security technical architects, and professional services using IBM Guardium.
Unit 1: Guardium overview
Unit 2: Guardium architecture
Unit 3: Guardium user interfaces
Unit 4: Access management
Unit 5: Guardium groups
Unit 6: System & data management
Unit 7: Guardium discovery & vulnerability assessment
Unit 8: Policy management
Unit 9: Guardium reporting
Unit 10: Guardium alerts
Unit 11: Audit process automation
Before taking this course, make sure that you have the following skills: