Get Started with Data Security Training
Maximize the value of your investment with Protegrity’s virtual, instructor-led data security training. If your company would benefit from a tailored combination of any of these courses, contact us at [email protected]
AVAILABLE COURSES
Protegrity’s Data Protection Fundamentals
Description
Protegrity’s Data Protection Fundamentals training course is designed to give you a high-level overview of Protegrity’s data protection platform, including how to define and discover sensitive data, how to protect data and select a protection method, and how to create and deploy a policy for data security.
The training will include demos and interactive activities to help you learn about Protegrity’s core products and data protection methods. No lab exercise included.
DOWNLOAD COURSE OUTLINEDuration: 4 Hours (half-day)
Audience: All
Recommended Prerequisite: None
Certificate of Completion: Yes
AGENDA
- About Protegrity
- Data-Centric Security
- Benefits of Protegrity’s Approach
- Our Philosophy
- Product Portfolio and Architecture
- Protector Definitions
- Protegrity Data Protection Methodology
- Overview of the Protegrity Platform
- Common Security Protection Methods and Tokenization
- Policy Management
- Policy Rules

Suwarna W. and Craig N.
The Instructors
“This partnership brings together two innovative companies with a common mission to help organizations get the most value out of their data, without any compromises to security or privacy.”
— Vikas Jain, Head of Snowflake Security Product Management
“This partnership brings together two innovative companies with a common mission to help organizations get the most value out of their data, without any compromises to security or privacy.”
— Vikas Jain, Head of Snowflake Security Product Management
“This partnership brings together two innovative companies with a common mission to help organizations get the most value out of their data, without any compromises to security or privacy.”
— Vikas Jain, Head of Snowflake Security Product Management
Protegrity Discover
Description
Discover and define sensitive data with Protegrity Discover. Protegrity Discover is a database-agnostic, sensitive discovery tool, designed so your organization can turn information into functional, decision-affecting resources and reduce the disruption and financial impact of multiple or third-party enterprise audits.
This training is a deep dive into discovering and classifying sensitive data, which will include demos, knowledge checks, and hands-on labs.
DOWNLOAD COURSE OUTLINEDuration: 4 hours (half-day)
Audience: Database administrators, system administrators, and security and governance officers
Recommended Prerequisite: Protegrity’s Data Protection Fundamentals course
Certificate of Completion: Yes
Agenda
- Overview of Protegrity Discover and its benefits
- Discover features and capabilities
- Dashboard overview,classifications,datasources o Discover rules (Tasks and Classifiers)
- Manage Discover logs
- Appliance (License, Kerberos, ODBC, Datastore)
- Install Protegrity Discover
- Create and test Protegrity Discover scans

Suwarna W. and Craig N.
The Instructors
Protegrity’s Enterprise Security Administrator (ESA)
Description
Centralize and monitor data security policies with Protegrity’s Enterprise Security Administrator (ESA). Protegrity Enterprise Security Administrator is an intuitive, comprehensive interface for centralized, visual administration of data security policies, key management, auditing, and reporting of sensitive data assets across the enterprise.
ESA provides full policy lifecycle management, as well as policy feedback tools. Users can also use dashboards to enable defining and monitoring while subsequently changing data security policies without disrupting business, modifying application code, or changing the underlying application environment.
This data security training course is a deep dive into understanding ESA and how it is used to manage policies across the enterprise. Training includes demos, knowledge checks, and hands-on labs.
DOWNLOAD COURSE OUTLINEDuration: 8 Hours (1 Day)
Audience: Security and governance officers, system administrators, developers, and solution architects
Recommended Prerequisite: Protegrity’s Data Protection Fundamentals Course
Certificate of Completion: Yes
AGENDA
- Overview of ESA
- Installation, Configuration, and Patching
- Users & Role Management
- Policy Management
- Key Management
- Certificate Management
- Backup & Restore
- Trusted Appliance Cluster
- Logging

Suwarna W. and Craig N.
The Instructors
“This partnership brings together two innovative companies with a common mission to help organizations get the most value out of their data, without any compromises to security or privacy.” — Vikas Jain, Head of Snowflake Security Product Management
“This partnership brings together two innovative companies with a common mission to help organizations get the most value out of their data, without any compromises to security or privacy.” — Vikas Jain, Head of Snowflake Security Product Management
“This partnership brings together two innovative companies with a common mission to help organizations get the most value out of their data, without any compromises to security or privacy.” — Vikas Jain, Head of Snowflake Security Product Management
Protegrity’s Data Security Gateway (DSG)
Description
Install and configure Protegrity’s Data Security Gateway for sensitive data in transit. Protegrity Data Security Gateway addresses these security, privacy, and compliance risks with advanced encryption and tokenization to transparently protect sensitive data as it moves across the network.
By securing data in real-time as it is transmitted, enterprises are assured that data automatically adhere to rules governing sensitive data at all times. Transparently protect sensitive data across the network without modifying applications or database calls. Protect applications and APIs quickly without impacting your business.
In this data security training, you will learn how to use the Data Security Gateway to protect sensitive data as it moves across the network without modifying applications or database calls. Training includes demos, knowledge checks, and hands-on labs
DOWNLOAD COURSE OUTLINEDuration: 12 Hours (1 ½ Day)
Audience: Developers, system administrators, and solution architects
Recommended Prerequisite: Protegrity’s Data Protection Fundamentals Course and Protegrity’s Enterprise Security Administrator (ESA)
Certificate of Completion: Yes
Agenda
- Overview and Features
- Benefits
- Use Cases
- Day-to-day Operation and Maintenance
- DSG Troubleshooting

Suwarna W. and Craig N.
The Instructors
Protegrity’s Application Protector for Java
Description
Install and configure Protegrity’s Application Protector for Java. The Protegrity Application Protector for Java provides APIs for performing security operations in the Client’s applications. The Protegrity Application Protector for Java is used in combination with the Enterprise Security Administrator (ESA). This training course is a deep dive into deploying the Application protector to protect data in an application. This training will include demos, knowledge checks, and hands-on labs.
DOWNLOAD COURSE OUTLINEDuration: 4 Hours (½ Day)
Audience: Developers, solution architects, and system administrators
Prerequisite: Protegrity’s Data Protection Fundamentals Course
Certificate of Completion: Yes
Agenda
- Overview of Application Protector
- Application Protector – Java
- Protegrity Application Protector: Standard Deployment Architecture
- Integration with Other Protectors
- Setup Overview
- Preparation and Installation
- Prepare to Install
- Install Logforwarder
- Install PEP Servero
- Install Application ProtectorJava
- Configure and Start PEP Server
- Protegrity Application Protector–API Documentation
- Troubleshooting

Suwarna W. and Craig N.
The Instructors
Protegrity’s Database Protector for Oracle
Description
Install and configure Protegrity’s Database Protector for Oracle. The Protegrity Oracle Database Protector is a software-based solution for handling column-level data protection on an Oracle database.
This column-level data protection is tightly integrated with the database, which results in better performance due to minimized overhead. The Protegrity Oracle Database Protector will be used in combination with the Enterprise Security Administrator (ESA).
This training course is a deep dive into column-level data protection on an Oracle database. Training will include demos, knowledge checks, and hands-on labs.
DOWNLOAD COURSE OUTLINEDuration: 4 Hours (½ Day)
Audience: Developers, database administrators, system administrators, and solution architects
Prerequisite: Protegrity’s Data Protection Fundamentals Course
Certificate of Completion: Yes
Agenda
- Overview of Protegrity’s Database Protector
- Database Protector: Protection at Rest
- Database Protector Cycle: Database Protector
- Installation
- Database Protectors: UDFs
- Scripts for Protect and Unprotect
- Protect and Unprotection Patterns
- PEP Server Examples
- Best Practices
- Troubleshooting

Suwarna W. and Craig N.
The Instructors
Protegrity’s Database Protector for MS SQL Server
Description
Install and configure Protegrity’s Database Protector for MS SQL Server. The Protegrity MS SQL Server Database Protector is a software-based solution for handling column-level data protection. This column-level data protection is tightly integrated with the database, which results in better performance due to minimized overhead.
The Protegrity MS SQL Server Protector will be used in combination with the Enterprise Security Administrator (ESA).
This training course is a deep-dive into column-level data protection on an MS SQL Server database. Training will include demos, knowledge checks, and hands-on labs.
DOWNLOAD COURSE OUTLINEDuration: 4 Hours (½ Day)
Audience: Developers, database administrators, system administrators, and solution architects
Prerequisite: Protegrity’s Data Protection Fundamentals Course
Certificate of Completion: Yes
Agenda
- Overview of Protegrity’s Database Protector
- Database Protector: Protection at Rest
- Database Protector Cycle: Database Protector
- Installation
- Database Protectors: UDFs
- Scripts for Protect and Unprotect
- Protect and Unprotection Patterns
- PEP Server Examples
- Best Practices
- Troubleshooting

Suwarna W. and Craig N.
The Instructors
Protegrity’s Application Protector for C
Description
Install and configure Protegrity’s Application Protector for C. The Protegrity Application Protector for C provides APIs for performing security operations in the client’s applications. The Protegrity Application Protector for C is used in combination with the Enterprise Security Administrator (ESA).
This course is an in-depth examination of deploying the application protector to protect data in an application. It includes demos, knowledge checks, and hands-on labs.
DOWNLOAD COURSE OUTLINEDuration: 4 Hours (half-day)
Audience: Developers, solution architects, and system administrators
Prerequisite: Protegrity’s Data Protection Fundamentals course
Certificate of Completion: Yes
Agenda
- Overview of Application Protector
- Application Protector – C
- Protegrity Application Protector Standard Deployment Architecture
- Architecture Example – Cooperating Protectors
- Protegrity Application Protector Setup – Brief Overview
- Prepare to install
- Install Log Forwarder
- Install PEP Server
- PEP Server Configuration
- Start Services

Suwarna W. and Craig N.
The Instructors
Protegrity’s Essentials Training
Description
Learn about Protegrity’s core products and get a detailed perspective of the Protegrity architecture. Gain an understanding of how to create a data security policy, key management, and the Protegrity platform installation and configuration process.
Training will include demos, knowledge checks, and hands-on labs.
DOWNLOAD COURSE OUTLINEDuration: 40 Hours (5 Full Days or 10 Half Days)
Audience: Security and governance officers, solution architects, database administrators, and system administrators
Prerequisite: None
Certificate of Completion: Yes
Agenda
- Protegrity’s Data Protection Fundamentals
- Protegrity Discover
- Protegrity’s Enterprise Security Administrator (ESA)
- Protegrity’s Data Protection Gateway (DSG)
- Protegrity’s Application Protector for Java
- Protegrity’s Database Protector for Oracle or MS SQL Server
- Protegrity’s Cloud API on AWS

Suwarna W. and Craig N.
The Instructors
Cloud API on AWS
Description
Learn how to install, configure, and use Protegrity’s Cloud API on AWS. The Protegrity Cloud API on AWS is a cloud-native, serverless product for fine-grained data protection.
This product provides a data protection API endpoint for clients. The product is designed to scale elastically and yield reliable query performance under extremely high concurrent loads.
During idle use, the serverless product will scale down completely, providing significant savings in Cloud computing fees. The Protegrity Cloud API on AWS is used in combination with the Enterprise Security Administrator (ESA). Using a simple REST API interface, authorized users can perform both de-identification (protect) and re-identification (unprotect) operations on data. The training course includes an overview of Cloud API to protect data in an AWS environment.
Training will include an overview, knowledge checks, and demo.
DOWNLOAD COURSE OUTLINEDuration: 4 Hours (1/2 day)
Audience: Developers, solution architects, and system administrators (Cloud Administrator)
Prerequisite: Protegrity’s Data Protection Fundamentals Course and Protegrity’s Enterprise Security Administrator (ESA)
Certificate of Completion: Yes
Agenda
- Overview of Cloud API
- Resilient Policy Deployment
- Cloud API on AWS
- Overview of Documentation and Downloads
- Demo of Cloud API on AWS
- Installation and Configuration
- Passing Data for Protection and Unprotection

Suwarna W. and Craig N.
The Instructors
Cloud API on Azure
Description
Learn about installing and using Protegrity’s Cloud Protect API on Azure. The Protegrity Cloud Protect API on Azure is a cloud-native, serverless product for fine-grained data protection. This product provides a data protection API endpoint for clients. During idle use, the serverless product will scale down completely, providing significant savings in Cloud-compute fees.
The Protegrity Cloud API on Azure is used in combination with the Enterprise Security Administrator (ESA).
Using a simple REST API interface, authorized users can perform both de-identification (protect) and re-identification (unprotect) operations on data.
This training course includes an overview of Cloud API to protect data in an Azure environment. This training includes an overview, knowledge checks, demo, and an exercise to test the protect and unprotect functions.
Duration: 4 hours (half-day)
Audience: Developers, solution architects, and system administrators (Cloud Administrator)
Prerequisite: Protegrity’s Data Protection Fundamentals Course and Protegrity’ s Enterprise Security Administrator (ESA)
Certificate of Completion: Yes
Agenda
- Overview of Cloud API
- Policy Deployment
- Cloud API on Azure
- Overview of documentation and downloads
- Installation prerequisites and steps for installation
- Post-installation configurations
- Protect and unprotect data

Suwarna W. and Craig N.
The Instructors
Snowflake Protector on AWS
Description
Learn how to install, configure, and use Protegrity’s Snowflake Protector on AWS. Snowflake Protector on AWS is a cloud-native, serverless product for fine-grained data protection with Snowflake, a managed Cloud data warehouse. This enables invocation of the Protegrity data protection cryptographic methods from the Snowflake SQL execution context.
The benefits of serverless include rapid auto-scaling, performance, low administrative overhead, and reduced infrastructure costs compared to a server-based solution.
The training course includes an overview of the Snowflake Protector to protect data in an AWS environment. Training will include an overview, knowledge checks, demo, and exercise.
DOWNLOAD COURSE OUTLINEDuration: 4 Hours (1/2 day)
Audience: Developers, solution architects, and system administrators (Database and Cloud Administrator)
Prerequisite: Protegrity’s Data Protection Fundamentals Course
Certificate of Completion: Yes
Agenda
- Overview of Snowflake
- Resilient Policy Deployment
- Snowflake Protector on AWS
- Overview of Documentation and Downloads
- Installation and Integration
- Protecting and Unprotecting Data

Suwarna W. and Craig N.
The Instructors
Snowflake Protector on Azure
Description
Learn how to install, configure, and use Protegrity’s Snowflake Protector on Azure. Snowflake Protector on Azure is a cloud native, serverless product for fine-grained data protection with SnowflakeTM, a managed Cloud data warehouse. This enables invocation of the Protegrity data protection cryptographic methods from the Snowflake SQL execution context. The benefits of serverless include rapid auto-scaling, performance, low administrative overhead, and reduced infrastructure costs compared to a server-based solution.
This training course includes an overview of the Snowflake Protector to protect data in an Azure environment. It includes an overview, knowledge checks, demo, and exercise.
DOWNLOAD COURSE OUTLINEDuration: 4 Hours (1/2 day)
Audience: Developers, solution architects, and system administrators (Database and Cloud Administrator)
Prerequisite: Protegrity’s Data Protection Fundamentals Course
Certificate of Completion: Yes
Agenda
- Overview of Snowflake
- Resilient policy deployment
- Snowflake Protector on Azure
- Overview of documentation and downloads
- Installation and integration
- Protecting and unprotecting data

Suwarna W. and Craig N.
The Instructors
JDBC Protector
Description
Learn how to install, configure, and use Protegrity’s JDBC Protector, which enables Java-based applications to work transparently with protected data in any database accessed by the JDBC, whether installed or cloud-managed. The JDBC Protector allows the proper reading and writing of sensitive data transparently with no or minimal changes to an application’s code. This capability accelerates cloud migration initiatives by allowing applications to move to the cloud and perform transactional workloads on protected data. This training course is a deep dive into installing the JDBC Protector to provide transparent data protection between the application layer and the SQL database. Training will include demos, knowledge checks, and hands-on lab exercises.
DOWNLOAD COURSE OUTLINEDuration: 4 Hours (1/2 day)
Audience: Developers, database administrators, solution architects, and system administrators
Prerequisite: Protegrity’s Data Protection Fundamentals Course
Certificate of Completion: Yes
Agenda
- Overview of Protegrity’s JDBC Protector
- Executing SQL via Protegrity’s JDBC Driver
- Installation and Configuration
- SQL Queries
- Protect and Unprotection Patterns
- Best Practices
- Troubleshooting

Suwarna W. and Craig N.
The Instructors
Dremio Protector
Description
Learn how to install, configure, and use the Protegrity Dremio Protector to protect data in Dremio. The Dremio Protector is part of our Protegrity Data Warehouse Protector family. It provides column-level (fine-grained) data protection for Dremio Enterprise Edition or Dremio community. The Dremio Protector enables Protegrity’s data protection methods directly in Dremio’s SQL context through internal database functions. The Protegrity Dremio Protector utilizes a data security policy maintained by an Enterprise Security Administrator (ESA).
The Dremio Protector supports several different deployment architectures, which will be discussed in the training, but only one of the deployments will be performed in the training.
Training will include an overview, demo, knowledge checks, and a hands-on lab exercise.
DOWNLOAD COURSE OUTLINEDuration: 4 Hours (half-day)
Audience: Developers, database administrators, solution architects, and system administrators
Prerequisite: Protegrity’s Data Protection Fundamentals Course
Certificate of Completion: Yes
Agenda
- Overview of Dremio
- Overview of Protegrity’s Dremio Protector
- Installation and Configuration
- Test Data Protection and Unprotection with an ESA Policy
- Best Practices
- Troubleshooting

Suwarna W. and Craig N.
The Instructors
Take the next step
See how Protegrity’s fine grain data protection solutions can enable your data security, compliance, sharing, and analytics.
Get an online or custom live demo.