Training Courses

Maximize the value of your investment with Protegrity (online two- and five-day courses) Trainings.

sign me up

What is it?

PROTEGRITY TRAINING OFFERS CUSTOMERS THE OPPORTUNITY TO DEVELOP THE SKILLS NECESSARY to BECOME DATA-SECURITY Experts.
Two-day Protegrity ‘Overview’ Training (Virtual; Instructor-led)

Five-day Protegrity ‘Essentials’ Training (Virtual: Instructor-led)

Is it Right for You?

WITH DATA BECOMING THE MOST VALUABLE ASSET OF AN ENTERPRISE, PROTEGRITY TRAINING IS DESIGNED TO HELP COMPANIES PROTECT THESE RESOURCES BY SIMPLIFYING THE COMPLEX NATURE OF DATA SECURITY.
Get a detailed perspective of the Protegrity architecture

Gain an understanding of security policies and their lifecycles

Learn about Protegrity platform installation and configuration processes

Protegrity Overview and Essentials Training

5-Day Essentials Training
The five-day ‘Essentials’ Course is designed to ensure proficiency with theProtegrity platform utilizing demos & interactive hands-on labs to walk through data discovery, key management, policy management and the use of Protegrity Protectors.
Training Day 1
INTRODUCTION
Protegrity overview and general data security concepts; Introduction to Protegrity products; High level compliance & regulation requirements.
Core Platform
Protegrity data security architecture; Explanation of various methods of securing sensitive data: Separation of duties.
Protegrity Methodology
Provides steps involved in protecting sensitive data throughout the enterprise.
Enterprise Security Administrator (ESA)
Overview & demo of ESA & its role in the Protegrity Data Security Platform; ESA features & functions.
Training Day 2
Decision on Data Protection Method
Overview of various methods of protection and what to consider when choosing between them.
Tokenization
Definition of Protegrity Vaultless Tokenization.
Data Security Policy Creation & Management
Definition of data security policy and related attributes (e.g. data stores, data elements, roles, etc.)
Training Day 3
Protegrity Discover
Overview, installation & configuration of sensitive data discovery across enterprise.
Application Protector
Overview, installation & configuration of Application Protector including trusted applications setup; Steps to protect data using Protegrity APIs.
Database Protector
Overview, installation & configuration of database Protector; Steps to protect data using Protegrity UDFs.
Training Day 4
Database Protector
Continued…
Protegrity integration with Snowflake for Data Protection
How Protegrity products / Protector components can be integrated with Snowflake for Data Protection.
Key Management
Key management and its importance in securing sensitive data; Key rotation strategy.
Training Day 5
data security gateway (dsg)
Overview of Protegrity Data Security Gateway features and functions; Profiles, rules and protocols (e.g. REST API, SFTP, etc.)
2-Day Overview Training
Training Day 1
INTRODUCTION
Protegrity overview and general data security concepts; Introduction to Protegrity products; High level compliance & regulation requirements.
Core Platform
Protegrity data security architecture; Explanation of various methods of securing sensitive data: Separation of duties.
Protegrity Methodology
Provides steps involved in protecting sensitive data throughout the enterprise.
Enterprise Security Administrator (ESA)
Overview & demo of ESA & its role in the Protegrity Data Security Platform; ESA features & functions.
Decision on Data Protection Method
Overview of various methods of protection and what to consider when choosing between them.
Tokenization
Definition of Protegrity Vaultless Tokenization.
Data Security Policy Creation & Management
Definition of data security policy and related attributes (e.g. data stores, data elements, roles, etc.)
Protegrity Discover
Overview, installation & configuration of sensitive data discovery across enterprise.
Training Day 2
Application Protector
Overview, installation & configuration of Application Protector including trusted applications setup; Steps to protect data using Protegrity APIs.
Database Protector
Overview, installation & configuration of database Protector; Steps to protect data using Protegrity UDFs.
Protegrity integration with Snowflake for Data Protection
How Protegrity products / Protector components can be integrated with Snowflake for Data Protection.
Key Management
Key management and its importance in securing sensitive data; Key rotation strategy.
Data Security Gateway (DSG)
Overview of Protegrity Data Security Gateway features and functions; Profiles, rules and protocols (e.g. REST API, SFTP, etc.)
sign me up