- Module 1 Data Loss Prevention Landscape
• Data Loss Prevention Landscape
• Data loss risk management
• Data Loss Prevention real‐world use cases
- Module 2 Overview of Symantec Data Loss Prevention
• Symantec Data Loss Prevention Suite
• Symantec Data Loss Prevention architecture
- Module 3 Identifying and Describing Confidential Data
• Identifying confidential data
• Configuring Symantec Data Loss Prevention to recognize confidential data
• Described Content Matching (DCM)
• Exact Data Matching (EDM)
• Indexed Document Matching (IDM)
• Vector Machine Learning (VML)
• Sensitive Image Recognition
• Custom file type detection
• Hands‐On Labs : Tour the Enforce console, create policy groups, configure a policy for Personally Identifiable Information (PII) detection, configure a policy for PCI compliance, configure a policy to protect confidential documents, configure a policy to protect source code, configure a policy for Form Recognition, use a template to add a DLP policy, export policies for use at a Disaster Recovery (DR) site, configure Optical Character Recognition (OCR)
- Module 4 Locating Confidential Data Stored on Premises and in the Cloud
• Determining where to search for confidential data
• Locating confidential data on corporate repositories
• Locating confidential data in the Cloud
• Locating confidential data on endpoint computers
• Hands‐On Labs : Run a Content Enumeration Scan, scan a Windows target, scan endpoint computers for confidential data.
- Module 5 Understanding How Confidential Data is Being Used
• Monitoring confidential data moving across the network
• Monitoring confidential data being used on endpoint computers
• Hands‐On Labs : Configure Network Prevent for Email to monitor SMTP messages, use Network Prevent for Email to monitor SMTP messages, monitor Endpoint activity
- Module 6 Educating Users to Adopt Data Protection Practices
• Implementing corporate training on data protection policies
• Providing notifications of user policy violations
• Hands‐On Labs : Configure the Active Directory lookup plugin, configure email notifications, configure onscreen notifications
- Module 7 Preventing Unauthorized Exposure of Confidential Data
• Using response rules to prevent the exposure of confidential data
• Protecting confidential data in motion
• Protecting confidential data in use
• Protecting confidential data at rest
• Hands‐On Labs : Configure SMTP blocking, test Optical Character Recognition (OCR) and the “HIPAA and HITECH (including PHI)” policy, configure endpoint blocking, configure endpoint User Cancel, scan and quarantine files on a server file share target, scan and quarantine files on an endpoint target
- Module 8 Remediating Data Loss Incidents and Tracking Risk Reduction
• Reviewing risk management frameworks
• Using incident reporting options to identify and assess risk
• Creating tools that support the organization’s risk reduction process
• Communicating risk to stakeholders
• Understanding advanced reporting options and analytics
• Hands‐On Labs : Configure roles and users, use reports to track risk exposure and reduction, define incident statuses and status groups, configure and use Smart Responses, schedule and send reports
- Module 9 Enhancing Data Loss Prevention with Integrations
• Symantec DLP integration mechanisms
• Symantec Information Centric Security
• Additional integrations with Symantec Enterprise solutions
• Communicating risk to stakeholders
• Hands‐On Labs : Create the views schema and user, run the incident data view setup script, verify incident data views creation, use incident data views
- Module 10 Course Review
• Review of Symantec DLP products and architecture
• Review of the stages in a Data Loss Prevention implementation