Lesson 1: Data Loss Prevention Landscape
- Data Loss Prevention landscape
- Data loss risk management
- Data Loss Prevention real-world use cases
Lesson 2: Overview of Symantec Data Loss Prevention
- Symantec Data Loss Prevention Suite
- Symantec Data Loss Prevention architecture
Lesson 3: Identifying and Describing Confidential Data
- Identifying confidential data
- Configuring Symantec Data Loss Prevention to recognize confidential data
- Described Content Matching (DCM)
- Exact Data Matching (EDM)
- Indexed Document Matching (IDM)
- Vector Machine Learning (VML)
- Form Recognition
- Custom file type detection
- Hands-On Labs Tour the Enforce console, create policy groups, configure a policy for Personally Identifiable Information (PII) detection, configure a policy for PCI compliance, configure a policy to protect confidential documents, configure a policy for source code protection, configure a policy for Form Recognition, use a template to add a DLP policy
Lesson 4: Locating Confidential Data at Rest
- Determine Where to Search for Confidential Data
- Locate Confidential Data on Corporate Repositories
- Locate Confidential Data in the Cloud
- Locate Confidential Data on Endpoint Computers
- Hands-On Labs Run a Content Enumeration Scan, scan a Windows target, scan endpoint computers.
Lesson 5: Understanding How Confidential Data is Being Used
- Monitoring confidential data moving across the network
- Monitoring confidential data being used on endpoint computers
- Hands-On Labs Configure Network Prevent for Email to monitor SMTP messages, use Network Prevent for Email to monitor SMTP messages, monitor Endpoint activity
Lesson 6: Educating End Users to Adopt Data-Protection Practices
- Implementing corporate training on data protection policies
- Providing notifications of user policy violations
- Hands-On Labs Configure the Active Directory lookup plugin, configure email notifications, configure onscreen notifications
Lesson 7: Preventing Unauthorized Exposure of Confidential Data
- Using response rules to prevent the exposure of confidential data
- Protecting confidential data in motion
- Protecting confidential data in use
- Protecting confidential data at rest
- Hands-On Labs Configure SMTP blocking, configure Endpoint blocking, configure Endpoint User Cancel, scan and quarantine files on a server file share target, scan and quarantine files on an Endpoint target
Lesson 8: Remediating Data Loss Incidents and Tracking Risk Reduction
- Reviewing risk management frameworks
- Using incident reporting options to identify and assess risk
- Creating tools that support the organization’s risk reduction process
- Communicating risk to stakeholders
- Understanding advanced reporting options and analytics
- Hands-On Labs Configure roles and users, use reports to track risk exposure and reduction, define incident statuses and status groups, configure and use Smart Responses, schedule and send reports
Lesson 9: Enhancing Data Loss Prevention Through Third-Party Integrations
- Symantec DLP integration mechanisms
- Symantec Enterprise Security solutions
- Overview of commercial third-party ecosystem for augmenting data protection programs
- Hands-On Labs Create the views schema and user, run the incident data view setup script, verify incident data views creation, use incident data views
Lesson 10: Review of Symantec Data Loss Prevention
- Review of Symantec DLP products and architecture
- Review of the stages in a Data Loss Prevention implementation