Call +603 7931 9658 Email: sales@tertiarycourses.com.my

HRD Corp Approved Training Provider Malaysia - Industrial 4.0 Certification Training and Education

SC-5003 Implement information Protection and Data Loss Prevention by Using Microsoft Purview

Begin your journey into the programming world with our Basic Java Training. This course meticulously covers the essential stepping stones of Java: from downloading and exploring the versatile NetBeans environment to grasping the foundational Java elements such as data types, strings, and arrays. Alongside this, you will learn to efficiently control the program's flow using functions and loops.

Furthermore, discover the art of creating and managing classes in Java. Enhance your coding dexterity as you navigate through sorting and searching within arrays and effectively manipulate files. With hands-on guidance, this training guarantees to build a robust foundation, setting the stage for your advanced programming endeavors.

Certificate

All participants will receive a Certificate of Completion from Tertiary Courses after achieved at least 75% attendance.

Funding and Grant

HRD Corp Claimable Course for Employers Registered with HRD Corp

HRDF claimable

Course Code: M285

Fee

MYR2,000.00

Course Date

Course Time

* Required Fields

Disclaimer:

The course dates displayed on our website are tentative and subject to trainer availability. We will confirm the final date after checking with the trainer. You are also welcome to email us your preferred date at sales@tertiarycourses.com.my, and we will do our best to coordinate with the trainer's schedule.

Post-Course Support

We may provide consultation related to the subject matter after the course. Please email your queries to sales@tertiarycourses.com.my and we will forward your queries to the subject matter experts and get back to you asap.

Course Cancellation/Reschedule Policy

We reserve the right to cancel or re-schedule the course due to unforeseen circumstances. If the course is cancelled, we will refund 100% to participants.
Note the venue of the training is subject to changes due to class size and availability of the classroom.
Note the minimal class size to start a class is 3 Pax.


Course Details

Topic 1 Introduction to information security and compliance in Microsoft Purview

  • Know your data
  • Protect your data
  • Prevent data loss
  • Govern your data

Topic 2 Create and manage sensitive information types

  • Sensitive information type overview
  • Compare built-in versus custom sensitive information types
  • Create and manage custom sensitive information types
  • Create and manage exact data match sensitive info types
  • Implement document fingerprinting
  • Describe named entities
  • Create a keyword dictionary

Topic 3 Create and configure sensitivity labels with Microsoft Purview

  • Sensitivity label overview
  • Create and configure sensitivity labels and label policies
  • Configure encryption with sensitivity labels
  • Implement auto-labeling policies
  • Use the data classification dashboard to monitor sensitivity labels

Topic 4 Prevent data loss in Microsoft Purview

  • Data loss prevention overview
  • Plan and design DLP policies
  • Understand DLP policy deployment and simulation mode
  • Create and manage DLP policies
  • Integrate Adaptive Protection with DLP
  • Use DLP analytics (preview) to identify data risks
  • Understand DLP alerts and activity tracking

Topic 5 Implement information protection and data loss prevention with Microsoft Purview

  • Configure your environment for administration
  • Create a sensitive info type
  • Create and publish a sensitivity label
  • Create a data loss prevention (DLP) policy

Course Info

Nil

Job Roles

  • Information Security Analyst
  • Data Protection Officer
  • Cybersecurity Consultant
  • Compliance and Risk Manager
  • IT Governance Specialist
  • Security Operations Center (SOC) Analyst
  • Data Privacy Officer
  • Microsoft Purview Specialist
  • Cloud Security Engineer
  • Enterprise Security Architect
  • DLP Policy Administrator
  • Regulatory Compliance Analyst
  • Identity and Access Management (IAM) Specialist
  • Security Threat Analyst
  • Data Governance Manager
  • Digital Forensics Specialist
  • Cloud Compliance Specialist
  • IT Security Administrator
  • Risk and Compliance Auditor
  • Enterprise Data Protection Officer

Trainers

Mohammad Reza Aminian: Mohammad Reza Aminian is a software engineer and PhD candidate in field of Artificial Intelligence with more than 4 years experience of teaching web technologies and scripting languages. skilled in PHP, JavaScript, system design, Laravel, and Vue.js frameworks. He has been involved in the development and implementation of web-based management systems, web applications and APIs in different organizations and companies.

Leong YH: Leong YH is a career trainer specializing in Java and open-source solutions such as Debian GNU/Linux, Liferay, Vaadin, Cayenne, PostgreSQL, J2EE and more. Though a CIMA graduate, he delights in learning and effective teaching a wide array of IT technologies to the uninitiated. For example, he taught COBOL in 1998.

Chee Tat: Chee Tat started his first job in startup - AMS. That's where he sharpened his skills in Full-stack Java Web Development, Software Design, and soft skills such as requirements gathering with client, client-handling during UAT, client training and "how to drive in and out from Singapore". 8 months later, AMS decided to promote Chee Tat as Team Lead after seeing his leadership potential. 4 years later, Chee Tat joined IBM via the headhunter. Started as an individual contributor, Chee Tat was playing around with many IBM Middleware/SOA products such as MQ, WMB and etc. Chee Tat also designed and built many Java programs combined with other IBM Middleware products as interfaces to the clients' legacy systems. 1 year later he was promoted as SOA Adapter Team Lead to lead 3-5 developers. Chee Tat's won 3 awards during his service with IBM.

Raj R: Raj R has more than 10 years, experience in architecting solutions in , Big Data , Data Analytics, Data Science , Artificial Intelligence , Machine Learning, IoT, and system integration.He has being coaching SQL, No-SQL, distributed applications (cloud /on-premise) , software methodologies, and integration tools.

Customer Reviews (7)

will recommend Review by Course Participant/Trainee
1. Do you find the course meet your expectation?
2. Do you find the trainer knowledgeable in this subject?
3. How do you find the training environment
. (Posted on 27/12/2019)
Will Recommend Review by Course Participant/Trainee
1. Do you find the course meet your expectation?
2. Do you find the trainer knowledgeable in this subject?
3. How do you find the training environment
More hand-one will be better (Posted on 30/10/2019)
Might Recomemnd Review by Course Participant/Trainee
1. Do you find the course meet your expectation?
2. Do you find the trainer knowledgeable in this subject?
3. How do you find the training environment
Course material needs to be more digestible for beginners (Posted on 10/07/2018)
Will Recommnd Review by Course Participant/Trainee
1. Do you find the course meet your expectation?
2. Do you find the trainer knowledgeable in this subject?
3. How do you find the training environment
Nil (Posted on 21/12/2016)
Will Recommend Review by Course Participant/Trainee
1. Do you find the course meet your expectation?
2. Do you find the trainer knowledgeable in this subject?
3. How do you find the training environment
Nil (Posted on 21/10/2016)
Will Recommend Review by Course Participant/Trainee
1. Do you find the course meet your expectation?
2. Do you find the trainer knowledgeable in this subject?
3. How do you find the training environment
Nil (Posted on 21/10/2016)
Will Recommend Review by Course Participant/Trainee
1. Do you find the course meet your expectation?
2. Do you find the trainer knowledgeable in this subject?
3. How do you find the training environment
quite a lot to cover in one day! (Posted on 21/10/2016)

Write Your Own Review

You're reviewing: SC-5003 Implement information Protection and Data Loss Prevention by Using Microsoft Purview

How do you rate this product? *

  1 star 2 stars 3 stars 4 stars 5 stars
1. Do you find the course meet your expectation?
2. Do you find the trainer knowledgeable in this subject?
3. How do you find the training environment
  • Reload captcha

You May Be Interested In These Courses