Training Courses

Maximize the value of your investment with Protegrity (virtual; instructor-led) Trainings.

Choose a Course

What is it?

PROTEGRITY TRAINING OFFERS CUSTOMERS THE OPPORTUNITY TO DEVELOP THE SKILLS NECESSARY to BECOME DATA-SECURITY Experts. take the following courses individually or take our intensive five-day training course.
Protegrity’s Data Protection Fundamentals
(up to 8 hours)

‍Protegrity Discover (up to 4 hours)

Protegrity’s Enterprise Security Administrator (ESA) (up to 12 hours)

Protegrity’s Data Security Gateway (DSG)
(up to 8 hours)

Protegrity’s Application Protector for Java
(up to 4 hours)

Protegrity’s Database Protector for Oracle
(up to 4 hours)

Five-day Protegrity ‘Essentials’ Training

Is it Right for You?

WITH DATA BECOMING THE MOST VALUABLE ASSET OF AN ENTERPRISE, PROTEGRITY TRAINING IS DESIGNED TO HELP COMPANIES PROTECT THESE RESOURCES BY SIMPLIFYING THE COMPLEX NATURE OF DATA SECURITY.
Get a detailed perspective of the Protegrity architecture

Gain an understanding of security policies and their lifecycles

Learn about Protegrity platform installation and configuration processes

If your company would benefit from a tailored combination of any of these courses, please email [email protected] with the request.

Protegrity Fundamentals and Essentials Training

5-Day Essentials Training
The five-day ‘Essentials’ Course is designed to ensure proficiency with the Protegrity platform utilizing demos & interactive hands-on labs to walk through data discovery, key management, policy management and the use of Protegrity Protectors.
Training Day 1
INTRODUCTION
Protegrity overview and general data security concepts; Introduction to Protegrity products; High level compliance & regulation requirements.
Core Platform
Protegrity data security architecture; Explanation of various methods of securing sensitive data: Separation of duties.
Protegrity Methodology
Provides steps involved in protecting sensitive data throughout the enterprise.
Decision on Data Protection Method
Overview of various methods of protection and what to consider when choosing between them.
Training Day 2
Protegrity Discover
Overview, installation & configuration of sensitive data discovery across enterprise.
ENTERPRISE SECURITY ADMINISTRATOR (ESA)
Overview & demo of ESA & its role in the Protegrity Data Security Platform; ESA features & functions.
Key Management
Key management and its importance in securing sensitive data; Key rotation strategy.
Training Day 3
ENTERPRISE SECURITY ADMINISTRATOR (ESA)
(CONTINUED)
Data Security Policy Creation & Management
Definition of data security policy and related attributes (e.g. data stores, data elements, roles, etc.)
Tokenization
Definition of Protegrity Vaultless Tokenization.
Training Day 4
data security gateway (dsg)
Install and configure Protegrity's Data Security Gateway for sensitive data in transit with an overview of features and functions; rules and protocols (e.g. REST API, SFTP, etc.)
Training Day 5
Application protector for java
Install and configure Protegrity's Application Protector for Java and get an overview of the APIs for performing security operations in applications.
Database Protector for oracle
Install and Configure Protegrity’s Database Protector for Oracle with a deep-dive into column-level data protection on an Oracle database.
1-Day Data Protection Fundamentals Training
INTRODUCTION
Protegrity overview and general data security concepts; Introduction to Protegrity products; High level compliance & regulation requirements.
Core Platform
Protegrity data security architecture; Explanation of various methods of securing sensitive data: Separation of duties.
Protegrity Methodology
Provides steps involved in protecting sensitive data throughout the enterprise.
Enterprise Security Administrator (ESA)
Overview & demo of ESA & its role in the Protegrity Data Security Platform.
Protegrity discover
Overview & demo of sensitive data discovery across enterprise.
Tokenization
Definition of Protegrity Vaultless Tokenization.
Data Protection Methods
Overview of various methods of protection and what to consider when choosing between them.
Data Security Policy Creation & Management
Definition of data security policy and related attributes (e.g. data stores, data elements, roles, etc.)
OVerview of Protectors
Overview of Protegrity's data protectors (e.g.  Application Protector, Database Protector, Data Security Gateway Protector, etc.)
Choose a Course