Data Loss Prevention (DLP) in the modern Enterprise!

  • Course provided by Udemy
  • Study type: Online
  • Starts: Anytime
  • Price: See latest price on Udemy
Udemy

Course Description

Welcome to the Data Loss Prevention (DLP) in the Enterprise Course! The course comprehensively covers the main concepts in Data Loss Prevention and explains the factors required for modern organizations to successfully implement a Data Loss Prevention Program.

Topics Covered:

  • Data Loss Incidents

  • Types of Sensitive Data

  • Data Formats and Transfer Channels

  • Sensitive Data Detection Methods

  • DLP Deployment Types

  • DLP Solution Types

  • Data Loss is a Business Risk

  • DLP is primarily a Process

  • Data Security Policy

  • DLP Selection Process

  • DLP Organization Structure (People Structure)

  • DLP High Level Processes



Additionally, this course explains the basic concepts of regular expressions and how they could be used for pattern matching to match almost any kind of textual data.

The Regex sessions are structured as below:

  • Basic Concepts - Metacharacters and their usage.

  • Challenges and Walkthrough - Practical Challenges for you to attempt your skills at Regular Expressions. Detailed walk through of solution. Examples include different kinds of data in table delimited format, json and xml.


By the end of the course, you would be confident to create your own regular expressions!


Happy Learning and All the Best!

-----

Topic Background: What is DLP?

Data loss prevention (DLP), is defined as technologies which perform both content inspection and contextual analysis of data sent via messaging applications such as email and instant messaging, in motion over the network, in use on a managed endpoint device, and at rest in on-premises file servers or in cloud applications and cloud storage. These solutions execute responses based on policy and rules defined to address the risk of inadvertent or accidental leaks or exposure of sensitive data outside authorized channels.

DLP technologies are broadly divided into two categories – Enterprise DLP and Integrated DLP. While Enterprise DLP solutions are comprehensive and packaged in agent software for desktops and servers, physical and virtual appliances for monitoring networks and email traffic, or soft appliances for data discovery, Integrated DLP is limited to secure web gateways, secure email gateways, email encryption products, enterprise content management platforms, data classification tools, data discovery tools, and cloud access security brokers.


What are Regular Expressions?

Regular Expression, or regex or regexp in short, is extremely and amazingly powerful in searching and manipulating text strings, particularly in processing text files. One line of regex can easily replace several dozen lines of programming codes.

Regex is supported in all the scripting languages (such as Perl, Python, PHP, and JavaScript); as well as general purpose programming languages such as Java; and even word processors such as Word for searching texts. Getting started with regex may not be easy due to its geeky syntax, but it is certainly worth the investment of your time.

Regular expression synax varies slightly between languages but for the most part the details are the same. Some regex implementations support slightly different variations on how they process as well as what certain special character sequences mean.

Who this course is for:

  • Anyone interested in learning about Data Loss Prevention (DLP) Concepts
  • Anyone interested in Cyber Security, IT Risk Management, IT Audit
  • Anyone interested in learning about Regular Expressions (Regex)
  • Anyone interested in developing the ability to write own Regular Expressions (Regex)

Course content

4 sections • 62 lectures • 2h 8m total length
  • Notes
    00:02
  • Expected Outcomes

    1. Key Concepts in Data Loss Prevention Sensitive Data Types Data Loss Prevention (DLP) Detection Methods Data Loss Prevention (DLP) Deployment Types Data Loss Prevention (DLP) Solution Types and how to select the best solution for the Organization Data Loss Prevention (DLP) Prerequisites Data Loss Prevention (DLP) Organizational Structure Data Loss Prevention (DLP) Processes Key Concepts in Regular Expressions Confidence to author Regular Expressions Regular Expressions (Regex) - How to formulate them How to use regular expressions to search and find almost anything under the sun! (textual data ofcourse ;) ) Show more Show less Requirements Basic understanding of IT within an Enterprise Description Welcome to the Data Loss Prevention (DLP) in the Enterprise Course! The course comprehensively covers the main concepts in Data Loss Prevention and explains the factors required for modern organizations to successfully implement a Data Loss Prevention Program. Topics Covered: Data Loss Incidents Types of Sensitive Data Data Formats and Transfer Channels Sensitive Data Detection Methods DLP Deployment Types DLP Solution Types Data Loss is a Business Risk DLP is primarily a Process Data Security Policy DLP Selection Process DLP Organization Structure (People Structure) DLP High Level Processes Additionally, this course explains the basic concepts of regular expressions and how they could be used for pattern matching to match almost any kind of textual data. The Regex sessions are structured as below: Basic Concepts - Metacharacters and their usage. Challenges and Walkthrough - Practical Challenges for you to attempt your skills at Regular Expressions. Detailed walk through of solution. Examples include different kinds of data in table delimited format, json and xml. By the end of the course, you would be confident to create your own regular expressions! Happy Learning and All the Best! ----- Topic Background: What is DLP? Data loss prevention (DLP), is defined as technologies which perform both content inspection and contextual analysis of data sent via messaging applications such as email and instant messaging, in motion over the network, in use on a managed endpoint device, and at rest in on-premises file servers or in cloud applications and cloud storage. These solutions execute responses based on policy and rules defined to address the risk of inadvertent or accidental leaks or exposure of sensitive data outside authorized channels. DLP technologies are broadly divided into two categories – Enterprise DLP and Integrated DLP. While Enterprise DLP solutions are comprehensive and packaged in agent software for desktops and servers, physical and virtual appliances for monitoring networks and email traffic, or soft appliances for data discovery, Integrated DLP is limited to secure web gateways, secure email gateways, email encryption products, enterprise content management platforms, data classification tools, data discovery tools, and cloud access security brokers. What are Regular Expressions? Regular Expression, or regex or regexp in short, is extremely and amazingly powerful in searching and manipulating text strings, particularly in processing text files. One line of regex can easily replace several dozen lines of programming codes. Regex is supported in all the scripting languages (such as Perl, Python, PHP, and JavaScript); as well as general purpose programming languages such as Java; and even word processors such as Word for searching texts. Getting started with regex may not be easy due to its geeky syntax, but it is certainly worth the investment of your time. Regular expression synax varies slightly between languages but for the most part the details are the same. Some regex implementations support slightly different variations on how they process as well as what certain special character sequences mean. Who this course is for: Anyone interested in learning about Data Loss Prevention (DLP) Concepts Anyone interested in Cyber Security, IT Risk Management, IT Audit Anyone interested in learning about Regular Expressions (Regex) Anyone interested in developing the ability to write own Regular Expressions (Regex) Show more Show less Course content 4 sections • 62 lectures • 2h 8m total length Expand all sections Data Loss Prevention (DLP) 13 lectures • 1hr 8min Introduction Preview 00:25 Notes 00:02 Data Loss Incidents 05:44 Types of Sensitive Data Preview 06:18 Data Formats and Data Transfer Channels 03:15 Sensitive Data Detection Methods 14:42 DLP Deployment Types 09:23 DLP Solution Types Preview 03:55 Data Loss is a Business Risk and Data Loss Prevention is primarily a Process 03:42 Data Security Policy 04:51 DLP Solution Selection Process 03:58 DLP Organizational Structure (People Structure) 01:47 DLP High Level Processes 09:35 Regular Expressions - Basic Concepts 8 lectures • 23min Regular Expressions - Introduction Preview 00:15 Metacharacters Preview 01:36 Square Brackets and Caret Within Preview 04:46 Caret, Dollar Sign, Round Brackets, Curley Brackets 04:58 Pipe 02:32 Plus, Star 03:46 Dot 02:51 Question Mark, Back Slash 02:21 Regular Expressions - Challenges and Walkthrough 26 lectures • 19min Challenge 1 00:07 Challenge 1 - Walkthrough 00:57 Challenge 2 00:10 Challenge 2 - Walkthrough 00:59 Challenge 3 00:11 Challenge 3 - Walkthrough 00:54 Challenge 4 00:11 Challenge 4 - Walkthrough 00:29 Challenge 5 00:13 Challenge 5 - Walkthrough 00:50 Challenge 6 00:13 Challenge 6 - Walkthrough 02:36 Challenge 7 00:19 Challenge 7 - Walkthrough 01:19 Challenge 8 00:19 Challenge 8 - Walkthrough 00:57 Challenge 9 00:19 Challenge 9 - Walkthrough 00:55 Challenge 10 00:05 Challenge 10 - Walkthrough 00:55 Challenge 11 00:05 Challenge 11 - Walkthrough 01:29 Challenge 12 00:05 Challenge 12 - Walkthrough 01:27 Challenge 13 00:05 Challenge 13 - Walkthrough 02:20 Regular Expressions - Real World Use Cases - Walkthrough 15 lectures • 19min Email Address 00:03 Email Address - Walkthrough 04:34 IP Address 00:03 IP Address - Walkthrough 02:55 Bitcoin Address 00:03 Bitcoin Address - Walkthrough 01:23 URL Address 00:03 URL Address - Walkthrough 02:29 Extract data from JSON Files 00:03 Extract data from JSON Files - Walkthrough 02:58 Extract data from XML files 00:03 Extract data from XML files - Walkthrough 03:11 Congratulations! 00:23 Bonus! 00:37 Feedback Time! 00:00 Instructor Risal Nasar Cyber Security and Technology Risk Management Trainer 4.6 Instructor Rating 99 Reviews 3,566 Students 4 Courses Trainer with 11 plus years of experience in Cyber Security, Technology Risk Management, Data Analytics and Automation spanning Banking, Insurance and Technology industries. Show more Show less Udemy Business Teach on Udemy Get the app About us Contact us Careers Blog Help and Support Affiliate Impressum Kontakt Terms Privacy policy Cookie settings Sitemap © 2021 Udemy, Inc. window.handleCSSToggleButtonClick = function (event) { var target = event.currentTarget; var cssToggleId = target && target.dataset && target.dataset.cssToggleId; var input = cssToggleId && document.getElementById(cssToggleId); if (input) { if (input.dataset.type === 'checkbox') { input.dataset.checked = input.dataset.checked ? '' : 'checked'; } else { input.dataset.checked = input.dataset.allowToggle && input.dataset.checked ? '' : 'checked'; var radios = document.querySelectorAll('[name="' + input.dataset.name + '"]'); for (var i = 0; i (function(){window['__CF$cv$params']={r:'677f42c2dfa440c0',m:'01805dd7069ca8743ecb50446232d14528530c63-1627822946-1800-AX/WK0fy4gdGe/TOKqzTTAhDrrt2d7OXtFcJ+RMc53KMcG1uTjPPYMGgq5U59NsuoQId07oe45rIn4WW4v/WrkcWLr3vfJCPqiQQxFaHyLu6JUf8Ma053VDjAF6WZ/FnFvGipfVwzzM0OZyK//pqqtJ4pb9cKFZq+D3ChsvWoyyOjiDTpL3Y5uA1NM0B6G7EHg==',s:[0xcb97af41b2,0x11ce8614f8],}})();
    2. Sensitive Data Types Data Loss Prevention (DLP) Detection Methods Data Loss Prevention (DLP) Deployment Types Data Loss Prevention (DLP) Solution Types and how to select the best solution for the Organization Data Loss Prevention (DLP) Prerequisites Data Loss Prevention (DLP) Organizational Structure Data Loss Prevention (DLP) Processes Key Concepts in Regular Expressions Confidence to author Regular Expressions Regular Expressions (Regex) - How to formulate them How to use regular expressions to search and find almost anything under the sun! (textual data ofcourse ;) ) Show more Show less Requirements Basic understanding of IT within an Enterprise Description Welcome to the Data Loss Prevention (DLP) in the Enterprise Course! The course comprehensively covers the main concepts in Data Loss Prevention and explains the factors required for modern organizations to successfully implement a Data Loss Prevention Program. Topics Covered: Data Loss Incidents Types of Sensitive Data Data Formats and Transfer Channels Sensitive Data Detection Methods DLP Deployment Types DLP Solution Types Data Loss is a Business Risk DLP is primarily a Process Data Security Policy DLP Selection Process DLP Organization Structure (People Structure) DLP High Level Processes Additionally, this course explains the basic concepts of regular expressions and how they could be used for pattern matching to match almost any kind of textual data. The Regex sessions are structured as below: Basic Concepts - Metacharacters and their usage. Challenges and Walkthrough - Practical Challenges for you to attempt your skills at Regular Expressions. Detailed walk through of solution. Examples include different kinds of data in table delimited format, json and xml. By the end of the course, you would be confident to create your own regular expressions! Happy Learning and All the Best! ----- Topic Background: What is DLP? Data loss prevention (DLP), is defined as technologies which perform both content inspection and contextual analysis of data sent via messaging applications such as email and instant messaging, in motion over the network, in use on a managed endpoint device, and at rest in on-premises file servers or in cloud applications and cloud storage. These solutions execute responses based on policy and rules defined to address the risk of inadvertent or accidental leaks or exposure of sensitive data outside authorized channels. DLP technologies are broadly divided into two categories – Enterprise DLP and Integrated DLP. While Enterprise DLP solutions are comprehensive and packaged in agent software for desktops and servers, physical and virtual appliances for monitoring networks and email traffic, or soft appliances for data discovery, Integrated DLP is limited to secure web gateways, secure email gateways, email encryption products, enterprise content management platforms, data classification tools, data discovery tools, and cloud access security brokers. What are Regular Expressions? Regular Expression, or regex or regexp in short, is extremely and amazingly powerful in searching and manipulating text strings, particularly in processing text files. One line of regex can easily replace several dozen lines of programming codes. Regex is supported in all the scripting languages (such as Perl, Python, PHP, and JavaScript); as well as general purpose programming languages such as Java; and even word processors such as Word for searching texts. Getting started with regex may not be easy due to its geeky syntax, but it is certainly worth the investment of your time. Regular expression synax varies slightly between languages but for the most part the details are the same. Some regex implementations support slightly different variations on how they process as well as what certain special character sequences mean. Who this course is for: Anyone interested in learning about Data Loss Prevention (DLP) Concepts Anyone interested in Cyber Security, IT Risk Management, IT Audit Anyone interested in learning about Regular Expressions (Regex) Anyone interested in developing the ability to write own Regular Expressions (Regex) Show more Show less Course content 4 sections • 62 lectures • 2h 8m total length Expand all sections Data Loss Prevention (DLP) 13 lectures • 1hr 8min Introduction Preview 00:25 Notes 00:02 Data Loss Incidents 05:44 Types of Sensitive Data Preview 06:18 Data Formats and Data Transfer Channels 03:15 Sensitive Data Detection Methods 14:42 DLP Deployment Types 09:23 DLP Solution Types Preview 03:55 Data Loss is a Business Risk and Data Loss Prevention is primarily a Process 03:42 Data Security Policy 04:51 DLP Solution Selection Process 03:58 DLP Organizational Structure (People Structure) 01:47 DLP High Level Processes 09:35 Regular Expressions - Basic Concepts 8 lectures • 23min Regular Expressions - Introduction Preview 00:15 Metacharacters Preview 01:36 Square Brackets and Caret Within Preview 04:46 Caret, Dollar Sign, Round Brackets, Curley Brackets 04:58 Pipe 02:32 Plus, Star 03:46 Dot 02:51 Question Mark, Back Slash 02:21 Regular Expressions - Challenges and Walkthrough 26 lectures • 19min Challenge 1 00:07 Challenge 1 - Walkthrough 00:57 Challenge 2 00:10 Challenge 2 - Walkthrough 00:59 Challenge 3 00:11 Challenge 3 - Walkthrough 00:54 Challenge 4 00:11 Challenge 4 - Walkthrough 00:29 Challenge 5 00:13 Challenge 5 - Walkthrough 00:50 Challenge 6 00:13 Challenge 6 - Walkthrough 02:36 Challenge 7 00:19 Challenge 7 - Walkthrough 01:19 Challenge 8 00:19 Challenge 8 - Walkthrough 00:57 Challenge 9 00:19 Challenge 9 - Walkthrough 00:55 Challenge 10 00:05 Challenge 10 - Walkthrough 00:55 Challenge 11 00:05 Challenge 11 - Walkthrough 01:29 Challenge 12 00:05 Challenge 12 - Walkthrough 01:27 Challenge 13 00:05 Challenge 13 - Walkthrough 02:20 Regular Expressions - Real World Use Cases - Walkthrough 15 lectures • 19min Email Address 00:03 Email Address - Walkthrough 04:34 IP Address 00:03 IP Address - Walkthrough 02:55 Bitcoin Address 00:03 Bitcoin Address - Walkthrough 01:23 URL Address 00:03 URL Address - Walkthrough 02:29 Extract data from JSON Files 00:03 Extract data from JSON Files - Walkthrough 02:58 Extract data from XML files 00:03 Extract data from XML files - Walkthrough 03:11 Congratulations! 00:23 Bonus! 00:37 Feedback Time! 00:00 Instructor Risal Nasar Cyber Security and Technology Risk Management Trainer 4.6 Instructor Rating 99 Reviews 3,566 Students 4 Courses Trainer with 11 plus years of experience in Cyber Security, Technology Risk Management, Data Analytics and Automation spanning Banking, Insurance and Technology industries. Show more Show less Udemy Business Teach on Udemy Get the app About us Contact us Careers Blog Help and Support Affiliate Impressum Kontakt Terms Privacy policy Cookie settings Sitemap © 2021 Udemy, Inc. window.handleCSSToggleButtonClick = function (event) { var target = event.currentTarget; var cssToggleId = target && target.dataset && target.dataset.cssToggleId; var input = cssToggleId && document.getElementById(cssToggleId); if (input) { if (input.dataset.type === 'checkbox') { input.dataset.checked = input.dataset.checked ? '' : 'checked'; } else { input.dataset.checked = input.dataset.allowToggle && input.dataset.checked ? '' : 'checked'; var radios = document.querySelectorAll('[name="' + input.dataset.name + '"]'); for (var i = 0; i (function(){window['__CF$cv$params']={r:'677f42c2dfa440c0',m:'01805dd7069ca8743ecb50446232d14528530c63-1627822946-1800-AX/WK0fy4gdGe/TOKqzTTAhDrrt2d7OXtFcJ+RMc53KMcG1uTjPPYMGgq5U59NsuoQId07oe45rIn4WW4v/WrkcWLr3vfJCPqiQQxFaHyLu6JUf8Ma053VDjAF6WZ/FnFvGipfVwzzM0OZyK//pqqtJ4pb9cKFZq+D3ChsvWoyyOjiDTpL3Y5uA1NM0B6G7EHg==',s:[0xcb97af41b2,0x11ce8614f8],}})();
    3. Data Loss Prevention (DLP) Detection Methods Data Loss Prevention (DLP) Deployment Types Data Loss Prevention (DLP) Solution Types and how to select the best solution for the Organization Data Loss Prevention (DLP) Prerequisites Data Loss Prevention (DLP) Organizational Structure Data Loss Prevention (DLP) Processes Key Concepts in Regular Expressions Confidence to author Regular Expressions Regular Expressions (Regex) - How to formulate them How to use regular expressions to search and find almost anything under the sun! (textual data ofcourse ;) ) Show more Show less Requirements Basic understanding of IT within an Enterprise Description Welcome to the Data Loss Prevention (DLP) in the Enterprise Course! The course comprehensively covers the main concepts in Data Loss Prevention and explains the factors required for modern organizations to successfully implement a Data Loss Prevention Program. Topics Covered: Data Loss Incidents Types of Sensitive Data Data Formats and Transfer Channels Sensitive Data Detection Methods DLP Deployment Types DLP Solution Types Data Loss is a Business Risk DLP is primarily a Process Data Security Policy DLP Selection Process DLP Organization Structure (People Structure) DLP High Level Processes Additionally, this course explains the basic concepts of regular expressions and how they could be used for pattern matching to match almost any kind of textual data. The Regex sessions are structured as below: Basic Concepts - Metacharacters and their usage. Challenges and Walkthrough - Practical Challenges for you to attempt your skills at Regular Expressions. Detailed walk through of solution. Examples include different kinds of data in table delimited format, json and xml. By the end of the course, you would be confident to create your own regular expressions! Happy Learning and All the Best! ----- Topic Background: What is DLP? Data loss prevention (DLP), is defined as technologies which perform both content inspection and contextual analysis of data sent via messaging applications such as email and instant messaging, in motion over the network, in use on a managed endpoint device, and at rest in on-premises file servers or in cloud applications and cloud storage. These solutions execute responses based on policy and rules defined to address the risk of inadvertent or accidental leaks or exposure of sensitive data outside authorized channels. DLP technologies are broadly divided into two categories – Enterprise DLP and Integrated DLP. While Enterprise DLP solutions are comprehensive and packaged in agent software for desktops and servers, physical and virtual appliances for monitoring networks and email traffic, or soft appliances for data discovery, Integrated DLP is limited to secure web gateways, secure email gateways, email encryption products, enterprise content management platforms, data classification tools, data discovery tools, and cloud access security brokers. What are Regular Expressions? Regular Expression, or regex or regexp in short, is extremely and amazingly powerful in searching and manipulating text strings, particularly in processing text files. One line of regex can easily replace several dozen lines of programming codes. Regex is supported in all the scripting languages (such as Perl, Python, PHP, and JavaScript); as well as general purpose programming languages such as Java; and even word processors such as Word for searching texts. Getting started with regex may not be easy due to its geeky syntax, but it is certainly worth the investment of your time. Regular expression synax varies slightly between languages but for the most part the details are the same. Some regex implementations support slightly different variations on how they process as well as what certain special character sequences mean. Who this course is for: Anyone interested in learning about Data Loss Prevention (DLP) Concepts Anyone interested in Cyber Security, IT Risk Management, IT Audit Anyone interested in learning about Regular Expressions (Regex) Anyone interested in developing the ability to write own Regular Expressions (Regex) Show more Show less Course content 4 sections • 62 lectures • 2h 8m total length Expand all sections Data Loss Prevention (DLP) 13 lectures • 1hr 8min Introduction Preview 00:25 Notes 00:02 Data Loss Incidents 05:44 Types of Sensitive Data Preview 06:18 Data Formats and Data Transfer Channels 03:15 Sensitive Data Detection Methods 14:42 DLP Deployment Types 09:23 DLP Solution Types Preview 03:55 Data Loss is a Business Risk and Data Loss Prevention is primarily a Process 03:42 Data Security Policy 04:51 DLP Solution Selection Process 03:58 DLP Organizational Structure (People Structure) 01:47 DLP High Level Processes 09:35 Regular Expressions - Basic Concepts 8 lectures • 23min Regular Expressions - Introduction Preview 00:15 Metacharacters Preview 01:36 Square Brackets and Caret Within Preview 04:46 Caret, Dollar Sign, Round Brackets, Curley Brackets 04:58 Pipe 02:32 Plus, Star 03:46 Dot 02:51 Question Mark, Back Slash 02:21 Regular Expressions - Challenges and Walkthrough 26 lectures • 19min Challenge 1 00:07 Challenge 1 - Walkthrough 00:57 Challenge 2 00:10 Challenge 2 - Walkthrough 00:59 Challenge 3 00:11 Challenge 3 - Walkthrough 00:54 Challenge 4 00:11 Challenge 4 - Walkthrough 00:29 Challenge 5 00:13 Challenge 5 - Walkthrough 00:50 Challenge 6 00:13 Challenge 6 - Walkthrough 02:36 Challenge 7 00:19 Challenge 7 - Walkthrough 01:19 Challenge 8 00:19 Challenge 8 - Walkthrough 00:57 Challenge 9 00:19 Challenge 9 - Walkthrough 00:55 Challenge 10 00:05 Challenge 10 - Walkthrough 00:55 Challenge 11 00:05 Challenge 11 - Walkthrough 01:29 Challenge 12 00:05 Challenge 12 - Walkthrough 01:27 Challenge 13 00:05 Challenge 13 - Walkthrough 02:20 Regular Expressions - Real World Use Cases - Walkthrough 15 lectures • 19min Email Address 00:03 Email Address - Walkthrough 04:34 IP Address 00:03 IP Address - Walkthrough 02:55 Bitcoin Address 00:03 Bitcoin Address - Walkthrough 01:23 URL Address 00:03 URL Address - Walkthrough 02:29 Extract data from JSON Files 00:03 Extract data from JSON Files - Walkthrough 02:58 Extract data from XML files 00:03 Extract data from XML files - Walkthrough 03:11 Congratulations! 00:23 Bonus! 00:37 Feedback Time! 00:00 Instructor Risal Nasar Cyber Security and Technology Risk Management Trainer 4.6 Instructor Rating 99 Reviews 3,566 Students 4 Courses Trainer with 11 plus years of experience in Cyber Security, Technology Risk Management, Data Analytics and Automation spanning Banking, Insurance and Technology industries. Show more Show less Udemy Business Teach on Udemy Get the app About us Contact us Careers Blog Help and Support Affiliate Impressum Kontakt Terms Privacy policy Cookie settings Sitemap © 2021 Udemy, Inc. window.handleCSSToggleButtonClick = function (event) { var target = event.currentTarget; var cssToggleId = target && target.dataset && target.dataset.cssToggleId; var input = cssToggleId && document.getElementById(cssToggleId); if (input) { if (input.dataset.type === 'checkbox') { input.dataset.checked = input.dataset.checked ? '' : 'checked'; } else { input.dataset.checked = input.dataset.allowToggle && input.dataset.checked ? '' : 'checked'; var radios = document.querySelectorAll('[name="' + input.dataset.name + '"]'); for (var i = 0; i (function(){window['__CF$cv$params']={r:'677f42c2dfa440c0',m:'01805dd7069ca8743ecb50446232d14528530c63-1627822946-1800-AX/WK0fy4gdGe/TOKqzTTAhDrrt2d7OXtFcJ+RMc53KMcG1uTjPPYMGgq5U59NsuoQId07oe45rIn4WW4v/WrkcWLr3vfJCPqiQQxFaHyLu6JUf8Ma053VDjAF6WZ/FnFvGipfVwzzM0OZyK//pqqtJ4pb9cKFZq+D3ChsvWoyyOjiDTpL3Y5uA1NM0B6G7EHg==',s:[0xcb97af41b2,0x11ce8614f8],}})();
    4. Data Loss Prevention (DLP) Deployment Types Data Loss Prevention (DLP) Solution Types and how to select the best solution for the Organization Data Loss Prevention (DLP) Prerequisites Data Loss Prevention (DLP) Organizational Structure Data Loss Prevention (DLP) Processes Key Concepts in Regular Expressions Confidence to author Regular Expressions Regular Expressions (Regex) - How to formulate them How to use regular expressions to search and find almost anything under the sun! (textual data ofcourse ;) ) Show more Show less Requirements Basic understanding of IT within an Enterprise Description Welcome to the Data Loss Prevention (DLP) in the Enterprise Course! The course comprehensively covers the main concepts in Data Loss Prevention and explains the factors required for modern organizations to successfully implement a Data Loss Prevention Program. Topics Covered: Data Loss Incidents Types of Sensitive Data Data Formats and Transfer Channels Sensitive Data Detection Methods DLP Deployment Types DLP Solution Types Data Loss is a Business Risk DLP is primarily a Process Data Security Policy DLP Selection Process DLP Organization Structure (People Structure) DLP High Level Processes Additionally, this course explains the basic concepts of regular expressions and how they could be used for pattern matching to match almost any kind of textual data. The Regex sessions are structured as below: Basic Concepts - Metacharacters and their usage. Challenges and Walkthrough - Practical Challenges for you to attempt your skills at Regular Expressions. Detailed walk through of solution. Examples include different kinds of data in table delimited format, json and xml. By the end of the course, you would be confident to create your own regular expressions! Happy Learning and All the Best! ----- Topic Background: What is DLP? Data loss prevention (DLP), is defined as technologies which perform both content inspection and contextual analysis of data sent via messaging applications such as email and instant messaging, in motion over the network, in use on a managed endpoint device, and at rest in on-premises file servers or in cloud applications and cloud storage. These solutions execute responses based on policy and rules defined to address the risk of inadvertent or accidental leaks or exposure of sensitive data outside authorized channels. DLP technologies are broadly divided into two categories – Enterprise DLP and Integrated DLP. While Enterprise DLP solutions are comprehensive and packaged in agent software for desktops and servers, physical and virtual appliances for monitoring networks and email traffic, or soft appliances for data discovery, Integrated DLP is limited to secure web gateways, secure email gateways, email encryption products, enterprise content management platforms, data classification tools, data discovery tools, and cloud access security brokers. What are Regular Expressions? Regular Expression, or regex or regexp in short, is extremely and amazingly powerful in searching and manipulating text strings, particularly in processing text files. One line of regex can easily replace several dozen lines of programming codes. Regex is supported in all the scripting languages (such as Perl, Python, PHP, and JavaScript); as well as general purpose programming languages such as Java; and even word processors such as Word for searching texts. Getting started with regex may not be easy due to its geeky syntax, but it is certainly worth the investment of your time. Regular expression synax varies slightly between languages but for the most part the details are the same. Some regex implementations support slightly different variations on how they process as well as what certain special character sequences mean. Who this course is for: Anyone interested in learning about Data Loss Prevention (DLP) Concepts Anyone interested in Cyber Security, IT Risk Management, IT Audit Anyone interested in learning about Regular Expressions (Regex) Anyone interested in developing the ability to write own Regular Expressions (Regex) Show more Show less Course content 4 sections • 62 lectures • 2h 8m total length Expand all sections Data Loss Prevention (DLP) 13 lectures • 1hr 8min Introduction Preview 00:25 Notes 00:02 Data Loss Incidents 05:44 Types of Sensitive Data Preview 06:18 Data Formats and Data Transfer Channels 03:15 Sensitive Data Detection Methods 14:42 DLP Deployment Types 09:23 DLP Solution Types Preview 03:55 Data Loss is a Business Risk and Data Loss Prevention is primarily a Process 03:42 Data Security Policy 04:51 DLP Solution Selection Process 03:58 DLP Organizational Structure (People Structure) 01:47 DLP High Level Processes 09:35 Regular Expressions - Basic Concepts 8 lectures • 23min Regular Expressions - Introduction Preview 00:15 Metacharacters Preview 01:36 Square Brackets and Caret Within Preview 04:46 Caret, Dollar Sign, Round Brackets, Curley Brackets 04:58 Pipe 02:32 Plus, Star 03:46 Dot 02:51 Question Mark, Back Slash 02:21 Regular Expressions - Challenges and Walkthrough 26 lectures • 19min Challenge 1 00:07 Challenge 1 - Walkthrough 00:57 Challenge 2 00:10 Challenge 2 - Walkthrough 00:59 Challenge 3 00:11 Challenge 3 - Walkthrough 00:54 Challenge 4 00:11 Challenge 4 - Walkthrough 00:29 Challenge 5 00:13 Challenge 5 - Walkthrough 00:50 Challenge 6 00:13 Challenge 6 - Walkthrough 02:36 Challenge 7 00:19 Challenge 7 - Walkthrough 01:19 Challenge 8 00:19 Challenge 8 - Walkthrough 00:57 Challenge 9 00:19 Challenge 9 - Walkthrough 00:55 Challenge 10 00:05 Challenge 10 - Walkthrough 00:55 Challenge 11 00:05 Challenge 11 - Walkthrough 01:29 Challenge 12 00:05 Challenge 12 - Walkthrough 01:27 Challenge 13 00:05 Challenge 13 - Walkthrough 02:20 Regular Expressions - Real World Use Cases - Walkthrough 15 lectures • 19min Email Address 00:03 Email Address - Walkthrough 04:34 IP Address 00:03 IP Address - Walkthrough 02:55 Bitcoin Address 00:03 Bitcoin Address - Walkthrough 01:23 URL Address 00:03 URL Address - Walkthrough 02:29 Extract data from JSON Files 00:03 Extract data from JSON Files - Walkthrough 02:58 Extract data from XML files 00:03 Extract data from XML files - Walkthrough 03:11 Congratulations! 00:23 Bonus! 00:37 Feedback Time! 00:00 Instructor Risal Nasar Cyber Security and Technology Risk Management Trainer 4.6 Instructor Rating 99 Reviews 3,566 Students 4 Courses Trainer with 11 plus years of experience in Cyber Security, Technology Risk Management, Data Analytics and Automation spanning Banking, Insurance and Technology industries. Show more Show less Udemy Business Teach on Udemy Get the app About us Contact us Careers Blog Help and Support Affiliate Impressum Kontakt Terms Privacy policy Cookie settings Sitemap © 2021 Udemy, Inc. window.handleCSSToggleButtonClick = function (event) { var target = event.currentTarget; var cssToggleId = target && target.dataset && target.dataset.cssToggleId; var input = cssToggleId && document.getElementById(cssToggleId); if (input) { if (input.dataset.type === 'checkbox') { input.dataset.checked = input.dataset.checked ? '' : 'checked'; } else { input.dataset.checked = input.dataset.allowToggle && input.dataset.checked ? '' : 'checked'; var radios = document.querySelectorAll('[name="' + input.dataset.name + '"]'); for (var i = 0; i (function(){window['__CF$cv$params']={r:'677f42c2dfa440c0',m:'01805dd7069ca8743ecb50446232d14528530c63-1627822946-1800-AX/WK0fy4gdGe/TOKqzTTAhDrrt2d7OXtFcJ+RMc53KMcG1uTjPPYMGgq5U59NsuoQId07oe45rIn4WW4v/WrkcWLr3vfJCPqiQQxFaHyLu6JUf8Ma053VDjAF6WZ/FnFvGipfVwzzM0OZyK//pqqtJ4pb9cKFZq+D3ChsvWoyyOjiDTpL3Y5uA1NM0B6G7EHg==',s:[0xcb97af41b2,0x11ce8614f8],}})();
    5. Data Loss Prevention (DLP) Solution Types and how to select the best solution for the Organization Data Loss Prevention (DLP) Prerequisites Data Loss Prevention (DLP) Organizational Structure Data Loss Prevention (DLP) Processes Key Concepts in Regular Expressions Confidence to author Regular Expressions Regular Expressions (Regex) - How to formulate them How to use regular expressions to search and find almost anything under the sun! (textual data ofcourse ;) ) Show more Show less Requirements Basic understanding of IT within an Enterprise Description Welcome to the Data Loss Prevention (DLP) in the Enterprise Course! The course comprehensively covers the main concepts in Data Loss Prevention and explains the factors required for modern organizations to successfully implement a Data Loss Prevention Program. Topics Covered: Data Loss Incidents Types of Sensitive Data Data Formats and Transfer Channels Sensitive Data Detection Methods DLP Deployment Types DLP Solution Types Data Loss is a Business Risk DLP is primarily a Process Data Security Policy DLP Selection Process DLP Organization Structure (People Structure) DLP High Level Processes Additionally, this course explains the basic concepts of regular expressions and how they could be used for pattern matching to match almost any kind of textual data. The Regex sessions are structured as below: Basic Concepts - Metacharacters and their usage. Challenges and Walkthrough - Practical Challenges for you to attempt your skills at Regular Expressions. Detailed walk through of solution. Examples include different kinds of data in table delimited format, json and xml. By the end of the course, you would be confident to create your own regular expressions! Happy Learning and All the Best! ----- Topic Background: What is DLP? Data loss prevention (DLP), is defined as technologies which perform both content inspection and contextual analysis of data sent via messaging applications such as email and instant messaging, in motion over the network, in use on a managed endpoint device, and at rest in on-premises file servers or in cloud applications and cloud storage. These solutions execute responses based on policy and rules defined to address the risk of inadvertent or accidental leaks or exposure of sensitive data outside authorized channels. DLP technologies are broadly divided into two categories – Enterprise DLP and Integrated DLP. While Enterprise DLP solutions are comprehensive and packaged in agent software for desktops and servers, physical and virtual appliances for monitoring networks and email traffic, or soft appliances for data discovery, Integrated DLP is limited to secure web gateways, secure email gateways, email encryption products, enterprise content management platforms, data classification tools, data discovery tools, and cloud access security brokers. What are Regular Expressions? Regular Expression, or regex or regexp in short, is extremely and amazingly powerful in searching and manipulating text strings, particularly in processing text files. One line of regex can easily replace several dozen lines of programming codes. Regex is supported in all the scripting languages (such as Perl, Python, PHP, and JavaScript); as well as general purpose programming languages such as Java; and even word processors such as Word for searching texts. Getting started with regex may not be easy due to its geeky syntax, but it is certainly worth the investment of your time. Regular expression synax varies slightly between languages but for the most part the details are the same. Some regex implementations support slightly different variations on how they process as well as what certain special character sequences mean. Who this course is for: Anyone interested in learning about Data Loss Prevention (DLP) Concepts Anyone interested in Cyber Security, IT Risk Management, IT Audit Anyone interested in learning about Regular Expressions (Regex) Anyone interested in developing the ability to write own Regular Expressions (Regex) Show more Show less Course content 4 sections • 62 lectures • 2h 8m total length Expand all sections Data Loss Prevention (DLP) 13 lectures • 1hr 8min Introduction Preview 00:25 Notes 00:02 Data Loss Incidents 05:44 Types of Sensitive Data Preview 06:18 Data Formats and Data Transfer Channels 03:15 Sensitive Data Detection Methods 14:42 DLP Deployment Types 09:23 DLP Solution Types Preview 03:55 Data Loss is a Business Risk and Data Loss Prevention is primarily a Process 03:42 Data Security Policy 04:51 DLP Solution Selection Process 03:58 DLP Organizational Structure (People Structure) 01:47 DLP High Level Processes 09:35 Regular Expressions - Basic Concepts 8 lectures • 23min Regular Expressions - Introduction Preview 00:15 Metacharacters Preview 01:36 Square Brackets and Caret Within Preview 04:46 Caret, Dollar Sign, Round Brackets, Curley Brackets 04:58 Pipe 02:32 Plus, Star 03:46 Dot 02:51 Question Mark, Back Slash 02:21 Regular Expressions - Challenges and Walkthrough 26 lectures • 19min Challenge 1 00:07 Challenge 1 - Walkthrough 00:57 Challenge 2 00:10 Challenge 2 - Walkthrough 00:59 Challenge 3 00:11 Challenge 3 - Walkthrough 00:54 Challenge 4 00:11 Challenge 4 - Walkthrough 00:29 Challenge 5 00:13 Challenge 5 - Walkthrough 00:50 Challenge 6 00:13 Challenge 6 - Walkthrough 02:36 Challenge 7 00:19 Challenge 7 - Walkthrough 01:19 Challenge 8 00:19 Challenge 8 - Walkthrough 00:57 Challenge 9 00:19 Challenge 9 - Walkthrough 00:55 Challenge 10 00:05 Challenge 10 - Walkthrough 00:55 Challenge 11 00:05 Challenge 11 - Walkthrough 01:29 Challenge 12 00:05 Challenge 12 - Walkthrough 01:27 Challenge 13 00:05 Challenge 13 - Walkthrough 02:20 Regular Expressions - Real World Use Cases - Walkthrough 15 lectures • 19min Email Address 00:03 Email Address - Walkthrough 04:34 IP Address 00:03 IP Address - Walkthrough 02:55 Bitcoin Address 00:03 Bitcoin Address - Walkthrough 01:23 URL Address 00:03 URL Address - Walkthrough 02:29 Extract data from JSON Files 00:03 Extract data from JSON Files - Walkthrough 02:58 Extract data from XML files 00:03 Extract data from XML files - Walkthrough 03:11 Congratulations! 00:23 Bonus! 00:37 Feedback Time! 00:00 Instructor Risal Nasar Cyber Security and Technology Risk Management Trainer 4.6 Instructor Rating 99 Reviews 3,566 Students 4 Courses Trainer with 11 plus years of experience in Cyber Security, Technology Risk Management, Data Analytics and Automation spanning Banking, Insurance and Technology industries. Show more Show less Udemy Business Teach on Udemy Get the app About us Contact us Careers Blog Help and Support Affiliate Impressum Kontakt Terms Privacy policy Cookie settings Sitemap © 2021 Udemy, Inc. window.handleCSSToggleButtonClick = function (event) { var target = event.currentTarget; var cssToggleId = target && target.dataset && target.dataset.cssToggleId; var input = cssToggleId && document.getElementById(cssToggleId); if (input) { if (input.dataset.type === 'checkbox') { input.dataset.checked = input.dataset.checked ? '' : 'checked'; } else { input.dataset.checked = input.dataset.allowToggle && input.dataset.checked ? '' : 'checked'; var radios = document.querySelectorAll('[name="' + input.dataset.name + '"]'); for (var i = 0; i (function(){window['__CF$cv$params']={r:'677f42c2dfa440c0',m:'01805dd7069ca8743ecb50446232d14528530c63-1627822946-1800-AX/WK0fy4gdGe/TOKqzTTAhDrrt2d7OXtFcJ+RMc53KMcG1uTjPPYMGgq5U59NsuoQId07oe45rIn4WW4v/WrkcWLr3vfJCPqiQQxFaHyLu6JUf8Ma053VDjAF6WZ/FnFvGipfVwzzM0OZyK//pqqtJ4pb9cKFZq+D3ChsvWoyyOjiDTpL3Y5uA1NM0B6G7EHg==',s:[0xcb97af41b2,0x11ce8614f8],}})();
    6. Data Loss Prevention (DLP) Prerequisites Data Loss Prevention (DLP) Organizational Structure Data Loss Prevention (DLP) Processes Key Concepts in Regular Expressions Confidence to author Regular Expressions Regular Expressions (Regex) - How to formulate them How to use regular expressions to search and find almost anything under the sun! (textual data ofcourse ;) ) Show more Show less Requirements Basic understanding of IT within an Enterprise Description Welcome to the Data Loss Prevention (DLP) in the Enterprise Course! The course comprehensively covers the main concepts in Data Loss Prevention and explains the factors required for modern organizations to successfully implement a Data Loss Prevention Program. Topics Covered: Data Loss Incidents Types of Sensitive Data Data Formats and Transfer Channels Sensitive Data Detection Methods DLP Deployment Types DLP Solution Types Data Loss is a Business Risk DLP is primarily a Process Data Security Policy DLP Selection Process DLP Organization Structure (People Structure) DLP High Level Processes Additionally, this course explains the basic concepts of regular expressions and how they could be used for pattern matching to match almost any kind of textual data. The Regex sessions are structured as below: Basic Concepts - Metacharacters and their usage. Challenges and Walkthrough - Practical Challenges for you to attempt your skills at Regular Expressions. Detailed walk through of solution. Examples include different kinds of data in table delimited format, json and xml. By the end of the course, you would be confident to create your own regular expressions! Happy Learning and All the Best! ----- Topic Background: What is DLP? Data loss prevention (DLP), is defined as technologies which perform both content inspection and contextual analysis of data sent via messaging applications such as email and instant messaging, in motion over the network, in use on a managed endpoint device, and at rest in on-premises file servers or in cloud applications and cloud storage. These solutions execute responses based on policy and rules defined to address the risk of inadvertent or accidental leaks or exposure of sensitive data outside authorized channels. DLP technologies are broadly divided into two categories – Enterprise DLP and Integrated DLP. While Enterprise DLP solutions are comprehensive and packaged in agent software for desktops and servers, physical and virtual appliances for monitoring networks and email traffic, or soft appliances for data discovery, Integrated DLP is limited to secure web gateways, secure email gateways, email encryption products, enterprise content management platforms, data classification tools, data discovery tools, and cloud access security brokers. What are Regular Expressions? Regular Expression, or regex or regexp in short, is extremely and amazingly powerful in searching and manipulating text strings, particularly in processing text files. One line of regex can easily replace several dozen lines of programming codes. Regex is supported in all the scripting languages (such as Perl, Python, PHP, and JavaScript); as well as general purpose programming languages such as Java; and even word processors such as Word for searching texts. Getting started with regex may not be easy due to its geeky syntax, but it is certainly worth the investment of your time. Regular expression synax varies slightly between languages but for the most part the details are the same. Some regex implementations support slightly different variations on how they process as well as what certain special character sequences mean. Who this course is for: Anyone interested in learning about Data Loss Prevention (DLP) Concepts Anyone interested in Cyber Security, IT Risk Management, IT Audit Anyone interested in learning about Regular Expressions (Regex) Anyone interested in developing the ability to write own Regular Expressions (Regex) Show more Show less Course content 4 sections • 62 lectures • 2h 8m total length Expand all sections Data Loss Prevention (DLP) 13 lectures • 1hr 8min Introduction Preview 00:25 Notes 00:02 Data Loss Incidents 05:44 Types of Sensitive Data Preview 06:18 Data Formats and Data Transfer Channels 03:15 Sensitive Data Detection Methods 14:42 DLP Deployment Types 09:23 DLP Solution Types Preview 03:55 Data Loss is a Business Risk and Data Loss Prevention is primarily a Process 03:42 Data Security Policy 04:51 DLP Solution Selection Process 03:58 DLP Organizational Structure (People Structure) 01:47 DLP High Level Processes 09:35 Regular Expressions - Basic Concepts 8 lectures • 23min Regular Expressions - Introduction Preview 00:15 Metacharacters Preview 01:36 Square Brackets and Caret Within Preview 04:46 Caret, Dollar Sign, Round Brackets, Curley Brackets 04:58 Pipe 02:32 Plus, Star 03:46 Dot 02:51 Question Mark, Back Slash 02:21 Regular Expressions - Challenges and Walkthrough 26 lectures • 19min Challenge 1 00:07 Challenge 1 - Walkthrough 00:57 Challenge 2 00:10 Challenge 2 - Walkthrough 00:59 Challenge 3 00:11 Challenge 3 - Walkthrough 00:54 Challenge 4 00:11 Challenge 4 - Walkthrough 00:29 Challenge 5 00:13 Challenge 5 - Walkthrough 00:50 Challenge 6 00:13 Challenge 6 - Walkthrough 02:36 Challenge 7 00:19 Challenge 7 - Walkthrough 01:19 Challenge 8 00:19 Challenge 8 - Walkthrough 00:57 Challenge 9 00:19 Challenge 9 - Walkthrough 00:55 Challenge 10 00:05 Challenge 10 - Walkthrough 00:55 Challenge 11 00:05 Challenge 11 - Walkthrough 01:29 Challenge 12 00:05 Challenge 12 - Walkthrough 01:27 Challenge 13 00:05 Challenge 13 - Walkthrough 02:20 Regular Expressions - Real World Use Cases - Walkthrough 15 lectures • 19min Email Address 00:03 Email Address - Walkthrough 04:34 IP Address 00:03 IP Address - Walkthrough 02:55 Bitcoin Address 00:03 Bitcoin Address - Walkthrough 01:23 URL Address 00:03 URL Address - Walkthrough 02:29 Extract data from JSON Files 00:03 Extract data from JSON Files - Walkthrough 02:58 Extract data from XML files 00:03 Extract data from XML files - Walkthrough 03:11 Congratulations! 00:23 Bonus! 00:37 Feedback Time! 00:00 Instructor Risal Nasar Cyber Security and Technology Risk Management Trainer 4.6 Instructor Rating 99 Reviews 3,566 Students 4 Courses Trainer with 11 plus years of experience in Cyber Security, Technology Risk Management, Data Analytics and Automation spanning Banking, Insurance and Technology industries. Show more Show less Udemy Business Teach on Udemy Get the app About us Contact us Careers Blog Help and Support Affiliate Impressum Kontakt Terms Privacy policy Cookie settings Sitemap © 2021 Udemy, Inc. window.handleCSSToggleButtonClick = function (event) { var target = event.currentTarget; var cssToggleId = target && target.dataset && target.dataset.cssToggleId; var input = cssToggleId && document.getElementById(cssToggleId); if (input) { if (input.dataset.type === 'checkbox') { input.dataset.checked = input.dataset.checked ? '' : 'checked'; } else { input.dataset.checked = input.dataset.allowToggle && input.dataset.checked ? '' : 'checked'; var radios = document.querySelectorAll('[name="' + input.dataset.name + '"]'); for (var i = 0; i (function(){window['__CF$cv$params']={r:'677f42c2dfa440c0',m:'01805dd7069ca8743ecb50446232d14528530c63-1627822946-1800-AX/WK0fy4gdGe/TOKqzTTAhDrrt2d7OXtFcJ+RMc53KMcG1uTjPPYMGgq5U59NsuoQId07oe45rIn4WW4v/WrkcWLr3vfJCPqiQQxFaHyLu6JUf8Ma053VDjAF6WZ/FnFvGipfVwzzM0OZyK//pqqtJ4pb9cKFZq+D3ChsvWoyyOjiDTpL3Y5uA1NM0B6G7EHg==',s:[0xcb97af41b2,0x11ce8614f8],}})();
    7. Data Loss Prevention (DLP) Organizational Structure Data Loss Prevention (DLP) Processes Key Concepts in Regular Expressions Confidence to author Regular Expressions Regular Expressions (Regex) - How to formulate them How to use regular expressions to search and find almost anything under the sun! (textual data ofcourse ;) ) Show more Show less Requirements Basic understanding of IT within an Enterprise Description Welcome to the Data Loss Prevention (DLP) in the Enterprise Course! The course comprehensively covers the main concepts in Data Loss Prevention and explains the factors required for modern organizations to successfully implement a Data Loss Prevention Program. Topics Covered: Data Loss Incidents Types of Sensitive Data Data Formats and Transfer Channels Sensitive Data Detection Methods DLP Deployment Types DLP Solution Types Data Loss is a Business Risk DLP is primarily a Process Data Security Policy DLP Selection Process DLP Organization Structure (People Structure) DLP High Level Processes Additionally, this course explains the basic concepts of regular expressions and how they could be used for pattern matching to match almost any kind of textual data. The Regex sessions are structured as below: Basic Concepts - Metacharacters and their usage. Challenges and Walkthrough - Practical Challenges for you to attempt your skills at Regular Expressions. Detailed walk through of solution. Examples include different kinds of data in table delimited format, json and xml. By the end of the course, you would be confident to create your own regular expressions! Happy Learning and All the Best! ----- Topic Background: What is DLP? Data loss prevention (DLP), is defined as technologies which perform both content inspection and contextual analysis of data sent via messaging applications such as email and instant messaging, in motion over the network, in use on a managed endpoint device, and at rest in on-premises file servers or in cloud applications and cloud storage. These solutions execute responses based on policy and rules defined to address the risk of inadvertent or accidental leaks or exposure of sensitive data outside authorized channels. DLP technologies are broadly divided into two categories – Enterprise DLP and Integrated DLP. While Enterprise DLP solutions are comprehensive and packaged in agent software for desktops and servers, physical and virtual appliances for monitoring networks and email traffic, or soft appliances for data discovery, Integrated DLP is limited to secure web gateways, secure email gateways, email encryption products, enterprise content management platforms, data classification tools, data discovery tools, and cloud access security brokers. What are Regular Expressions? Regular Expression, or regex or regexp in short, is extremely and amazingly powerful in searching and manipulating text strings, particularly in processing text files. One line of regex can easily replace several dozen lines of programming codes. Regex is supported in all the scripting languages (such as Perl, Python, PHP, and JavaScript); as well as general purpose programming languages such as Java; and even word processors such as Word for searching texts. Getting started with regex may not be easy due to its geeky syntax, but it is certainly worth the investment of your time. Regular expression synax varies slightly between languages but for the most part the details are the same. Some regex implementations support slightly different variations on how they process as well as what certain special character sequences mean. Who this course is for: Anyone interested in learning about Data Loss Prevention (DLP) Concepts Anyone interested in Cyber Security, IT Risk Management, IT Audit Anyone interested in learning about Regular Expressions (Regex) Anyone interested in developing the ability to write own Regular Expressions (Regex) Show more Show less Course content 4 sections • 62 lectures • 2h 8m total length Expand all sections Data Loss Prevention (DLP) 13 lectures • 1hr 8min Introduction Preview 00:25 Notes 00:02 Data Loss Incidents 05:44 Types of Sensitive Data Preview 06:18 Data Formats and Data Transfer Channels 03:15 Sensitive Data Detection Methods 14:42 DLP Deployment Types 09:23 DLP Solution Types Preview 03:55 Data Loss is a Business Risk and Data Loss Prevention is primarily a Process 03:42 Data Security Policy 04:51 DLP Solution Selection Process 03:58 DLP Organizational Structure (People Structure) 01:47 DLP High Level Processes 09:35 Regular Expressions - Basic Concepts 8 lectures • 23min Regular Expressions - Introduction Preview 00:15 Metacharacters Preview 01:36 Square Brackets and Caret Within Preview 04:46 Caret, Dollar Sign, Round Brackets, Curley Brackets 04:58 Pipe 02:32 Plus, Star 03:46 Dot 02:51 Question Mark, Back Slash 02:21 Regular Expressions - Challenges and Walkthrough 26 lectures • 19min Challenge 1 00:07 Challenge 1 - Walkthrough 00:57 Challenge 2 00:10 Challenge 2 - Walkthrough 00:59 Challenge 3 00:11 Challenge 3 - Walkthrough 00:54 Challenge 4 00:11 Challenge 4 - Walkthrough 00:29 Challenge 5 00:13 Challenge 5 - Walkthrough 00:50 Challenge 6 00:13 Challenge 6 - Walkthrough 02:36 Challenge 7 00:19 Challenge 7 - Walkthrough 01:19 Challenge 8 00:19 Challenge 8 - Walkthrough 00:57 Challenge 9 00:19 Challenge 9 - Walkthrough 00:55 Challenge 10 00:05 Challenge 10 - Walkthrough 00:55 Challenge 11 00:05 Challenge 11 - Walkthrough 01:29 Challenge 12 00:05 Challenge 12 - Walkthrough 01:27 Challenge 13 00:05 Challenge 13 - Walkthrough 02:20 Regular Expressions - Real World Use Cases - Walkthrough 15 lectures • 19min Email Address 00:03 Email Address - Walkthrough 04:34 IP Address 00:03 IP Address - Walkthrough 02:55 Bitcoin Address 00:03 Bitcoin Address - Walkthrough 01:23 URL Address 00:03 URL Address - Walkthrough 02:29 Extract data from JSON Files 00:03 Extract data from JSON Files - Walkthrough 02:58 Extract data from XML files 00:03 Extract data from XML files - Walkthrough 03:11 Congratulations! 00:23 Bonus! 00:37 Feedback Time! 00:00 Instructor Risal Nasar Cyber Security and Technology Risk Management Trainer 4.6 Instructor Rating 99 Reviews 3,566 Students 4 Courses Trainer with 11 plus years of experience in Cyber Security, Technology Risk Management, Data Analytics and Automation spanning Banking, Insurance and Technology industries. Show more Show less Udemy Business Teach on Udemy Get the app About us Contact us Careers Blog Help and Support Affiliate Impressum Kontakt Terms Privacy policy Cookie settings Sitemap © 2021 Udemy, Inc. window.handleCSSToggleButtonClick = function (event) { var target = event.currentTarget; var cssToggleId = target && target.dataset && target.dataset.cssToggleId; var input = cssToggleId && document.getElementById(cssToggleId); if (input) { if (input.dataset.type === 'checkbox') { input.dataset.checked = input.dataset.checked ? '' : 'checked'; } else { input.dataset.checked = input.dataset.allowToggle && input.dataset.checked ? '' : 'checked'; var radios = document.querySelectorAll('[name="' + input.dataset.name + '"]'); for (var i = 0; i (function(){window['__CF$cv$params']={r:'677f42c2dfa440c0',m:'01805dd7069ca8743ecb50446232d14528530c63-1627822946-1800-AX/WK0fy4gdGe/TOKqzTTAhDrrt2d7OXtFcJ+RMc53KMcG1uTjPPYMGgq5U59NsuoQId07oe45rIn4WW4v/WrkcWLr3vfJCPqiQQxFaHyLu6JUf8Ma053VDjAF6WZ/FnFvGipfVwzzM0OZyK//pqqtJ4pb9cKFZq+D3ChsvWoyyOjiDTpL3Y5uA1NM0B6G7EHg==',s:[0xcb97af41b2,0x11ce8614f8],}})();
    8. Data Loss Prevention (DLP) Processes Key Concepts in Regular Expressions Confidence to author Regular Expressions Regular Expressions (Regex) - How to formulate them How to use regular expressions to search and find almost anything under the sun! (textual data ofcourse ;) ) Show more Show less Requirements Basic understanding of IT within an Enterprise Description Welcome to the Data Loss Prevention (DLP) in the Enterprise Course! The course comprehensively covers the main concepts in Data Loss Prevention and explains the factors required for modern organizations to successfully implement a Data Loss Prevention Program. Topics Covered: Data Loss Incidents Types of Sensitive Data Data Formats and Transfer Channels Sensitive Data Detection Methods DLP Deployment Types DLP Solution Types Data Loss is a Business Risk DLP is primarily a Process Data Security Policy DLP Selection Process DLP Organization Structure (People Structure) DLP High Level Processes Additionally, this course explains the basic concepts of regular expressions and how they could be used for pattern matching to match almost any kind of textual data. The Regex sessions are structured as below: Basic Concepts - Metacharacters and their usage. Challenges and Walkthrough - Practical Challenges for you to attempt your skills at Regular Expressions. Detailed walk through of solution. Examples include different kinds of data in table delimited format, json and xml. By the end of the course, you would be confident to create your own regular expressions! Happy Learning and All the Best! ----- Topic Background: What is DLP? Data loss prevention (DLP), is defined as technologies which perform both content inspection and contextual analysis of data sent via messaging applications such as email and instant messaging, in motion over the network, in use on a managed endpoint device, and at rest in on-premises file servers or in cloud applications and cloud storage. These solutions execute responses based on policy and rules defined to address the risk of inadvertent or accidental leaks or exposure of sensitive data outside authorized channels. DLP technologies are broadly divided into two categories – Enterprise DLP and Integrated DLP. While Enterprise DLP solutions are comprehensive and packaged in agent software for desktops and servers, physical and virtual appliances for monitoring networks and email traffic, or soft appliances for data discovery, Integrated DLP is limited to secure web gateways, secure email gateways, email encryption products, enterprise content management platforms, data classification tools, data discovery tools, and cloud access security brokers. What are Regular Expressions? Regular Expression, or regex or regexp in short, is extremely and amazingly powerful in searching and manipulating text strings, particularly in processing text files. One line of regex can easily replace several dozen lines of programming codes. Regex is supported in all the scripting languages (such as Perl, Python, PHP, and JavaScript); as well as general purpose programming languages such as Java; and even word processors such as Word for searching texts. Getting started with regex may not be easy due to its geeky syntax, but it is certainly worth the investment of your time. Regular expression synax varies slightly between languages but for the most part the details are the same. Some regex implementations support slightly different variations on how they process as well as what certain special character sequences mean. Who this course is for: Anyone interested in learning about Data Loss Prevention (DLP) Concepts Anyone interested in Cyber Security, IT Risk Management, IT Audit Anyone interested in learning about Regular Expressions (Regex) Anyone interested in developing the ability to write own Regular Expressions (Regex) Show more Show less Course content 4 sections • 62 lectures • 2h 8m total length Expand all sections Data Loss Prevention (DLP) 13 lectures • 1hr 8min Introduction Preview 00:25 Notes 00:02 Data Loss Incidents 05:44 Types of Sensitive Data Preview 06:18 Data Formats and Data Transfer Channels 03:15 Sensitive Data Detection Methods 14:42 DLP Deployment Types 09:23 DLP Solution Types Preview 03:55 Data Loss is a Business Risk and Data Loss Prevention is primarily a Process 03:42 Data Security Policy 04:51 DLP Solution Selection Process 03:58 DLP Organizational Structure (People Structure) 01:47 DLP High Level Processes 09:35 Regular Expressions - Basic Concepts 8 lectures • 23min Regular Expressions - Introduction Preview 00:15 Metacharacters Preview 01:36 Square Brackets and Caret Within Preview 04:46 Caret, Dollar Sign, Round Brackets, Curley Brackets 04:58 Pipe 02:32 Plus, Star 03:46 Dot 02:51 Question Mark, Back Slash 02:21 Regular Expressions - Challenges and Walkthrough 26 lectures • 19min Challenge 1 00:07 Challenge 1 - Walkthrough 00:57 Challenge 2 00:10 Challenge 2 - Walkthrough 00:59 Challenge 3 00:11 Challenge 3 - Walkthrough 00:54 Challenge 4 00:11 Challenge 4 - Walkthrough 00:29 Challenge 5 00:13 Challenge 5 - Walkthrough 00:50 Challenge 6 00:13 Challenge 6 - Walkthrough 02:36 Challenge 7 00:19 Challenge 7 - Walkthrough 01:19 Challenge 8 00:19 Challenge 8 - Walkthrough 00:57 Challenge 9 00:19 Challenge 9 - Walkthrough 00:55 Challenge 10 00:05 Challenge 10 - Walkthrough 00:55 Challenge 11 00:05 Challenge 11 - Walkthrough 01:29 Challenge 12 00:05 Challenge 12 - Walkthrough 01:27 Challenge 13 00:05 Challenge 13 - Walkthrough 02:20 Regular Expressions - Real World Use Cases - Walkthrough 15 lectures • 19min Email Address 00:03 Email Address - Walkthrough 04:34 IP Address 00:03 IP Address - Walkthrough 02:55 Bitcoin Address 00:03 Bitcoin Address - Walkthrough 01:23 URL Address 00:03 URL Address - Walkthrough 02:29 Extract data from JSON Files 00:03 Extract data from JSON Files - Walkthrough 02:58 Extract data from XML files 00:03 Extract data from XML files - Walkthrough 03:11 Congratulations! 00:23 Bonus! 00:37 Feedback Time! 00:00 Instructor Risal Nasar Cyber Security and Technology Risk Management Trainer 4.6 Instructor Rating 99 Reviews 3,566 Students 4 Courses Trainer with 11 plus years of experience in Cyber Security, Technology Risk Management, Data Analytics and Automation spanning Banking, Insurance and Technology industries. Show more Show less Udemy Business Teach on Udemy Get the app About us Contact us Careers Blog Help and Support Affiliate Impressum Kontakt Terms Privacy policy Cookie settings Sitemap © 2021 Udemy, Inc. window.handleCSSToggleButtonClick = function (event) { var target = event.currentTarget; var cssToggleId = target && target.dataset && target.dataset.cssToggleId; var input = cssToggleId && document.getElementById(cssToggleId); if (input) { if (input.dataset.type === 'checkbox') { input.dataset.checked = input.dataset.checked ? '' : 'checked'; } else { input.dataset.checked = input.dataset.allowToggle && input.dataset.checked ? '' : 'checked'; var radios = document.querySelectorAll('[name="' + input.dataset.name + '"]'); for (var i = 0; i (function(){window['__CF$cv$params']={r:'677f42c2dfa440c0',m:'01805dd7069ca8743ecb50446232d14528530c63-1627822946-1800-AX/WK0fy4gdGe/TOKqzTTAhDrrt2d7OXtFcJ+RMc53KMcG1uTjPPYMGgq5U59NsuoQId07oe45rIn4WW4v/WrkcWLr3vfJCPqiQQxFaHyLu6JUf8Ma053VDjAF6WZ/FnFvGipfVwzzM0OZyK//pqqtJ4pb9cKFZq+D3ChsvWoyyOjiDTpL3Y5uA1NM0B6G7EHg==',s:[0xcb97af41b2,0x11ce8614f8],}})();
    9. Key Concepts in Regular Expressions Confidence to author Regular Expressions Regular Expressions (Regex) - How to formulate them How to use regular expressions to search and find almost anything under the sun! (textual data ofcourse ;) ) Show more Show less Requirements Basic understanding of IT within an Enterprise Description Welcome to the Data Loss Prevention (DLP) in the Enterprise Course! The course comprehensively covers the main concepts in Data Loss Prevention and explains the factors required for modern organizations to successfully implement a Data Loss Prevention Program. Topics Covered: Data Loss Incidents Types of Sensitive Data Data Formats and Transfer Channels Sensitive Data Detection Methods DLP Deployment Types DLP Solution Types Data Loss is a Business Risk DLP is primarily a Process Data Security Policy DLP Selection Process DLP Organization Structure (People Structure) DLP High Level Processes Additionally, this course explains the basic concepts of regular expressions and how they could be used for pattern matching to match almost any kind of textual data. The Regex sessions are structured as below: Basic Concepts - Metacharacters and their usage. Challenges and Walkthrough - Practical Challenges for you to attempt your skills at Regular Expressions. Detailed walk through of solution. Examples include different kinds of data in table delimited format, json and xml. By the end of the course, you would be confident to create your own regular expressions! Happy Learning and All the Best! ----- Topic Background: What is DLP? Data loss prevention (DLP), is defined as technologies which perform both content inspection and contextual analysis of data sent via messaging applications such as email and instant messaging, in motion over the network, in use on a managed endpoint devic