Course Content
Introduction to Data Loss Prevention
- List the key features of the RSA DLP Suite
- Identify the key components of the RSA DLP Suite
- Describe the role of RSA DLP Enterprise Manager
- Explain the differences between RSA DLP Network, Datacenter, and Endpoint
- Define how policy violations are handled by RSA DLP Endpoint Enforce
Enterprise Manager Administration
- Login to the Enterprise Manager for the first time
- List the key features of Enterprise Manager
- Access and license the Enterprise Manager
- List new dashboard features
- Review the Enterprise Manager tabs
- Enter LDAP configuration settings
- Perform user and group administration
- Configure an email server and notifications
- Delete incidents and events
- Display device status
Network Appliance Configuration
- Identify the main components of RSA DLP Network
- Re-install an RSA DLP Network appliance
- Login to an RSA DLP Network appliance
- Perform an initial configuration of an appliance
- Perform basic configuration for a RSA DLP Network Interceptor
- Describe the Email Self Release feature
- Evaluate sensor capacity needs
- Diagram the ICAP server event flow
- Perform a basic configuration of an ICAP server
Introduction to Policies
- Explain the function of the RSA DLP Content Classification and Analysis system
- Describe the use and purpose of policies in the DLP Suite
- Explain how content blades are used in policies to detect sensitive information
- Create policies using a supplied template
- Configure DLP Network policies in a virtual network environment
DLP Datacenter
- List key features and components of DLP Datacenter
- Install the Enterprise Coordinator
- Configure the Enterprise Coordinator
- Describe the scan types available in DLP Datacenter
- Install and configure a site coordinator
- Create a grid scan group
- View scan status and history
Creating Content Blades
- Compare fingerprinting and describing content
- List the detection accuracy methods available
- Discuss the importance of weight, score and count
- Discuss the importance of accuracy and precision
- Explain how a risk score determines severity
- Manage and create content blades
Working with Fingerprinted Content
- Describe fingerprinting and hashes
- Define fingerprinting terminology
- Configure a file crawler
- Configure a database crawler
Agent and Repository Scans
- Analyze agent scan status
- Configure an agent scan group
- Schedule an agent scan
- Analyze agent scan history
- Configure a repository database scan
DLP Endpoint
- Explain how DLP Endpoint Enforce works
- List the components that comprise DLP Endpoint
- Configure policy settings relevant to DLP Endpoint
- Install DLP Endpoint Enforce agents
- Create a DLP Endpoint Enforce group
- Manually deploy a DLP Endpoint Enforce agent
Workflow and Remediation
- Describe incident and event workflow within RSA DLP
- Compare DLP remediation actions
- Describe how manual remediation functions
- View policy, incident, and transmission details
- View incident history and notifications
Reports
- Describe the main DLP reporting features
- Navigate the Enterprise Manager dashboard
- View and edit reports
- Customize a report
- Export report data
- Create DLP Asset Heat Map reports
Basic Operations
- Export and import DLP configuration files
- Review backup options for DLP
- Discuss high availability options for DLP components
- Describe how to configure Enterprise Manager failover
- Review Patching and upgrade operations for DLP
- List the benefits of integrating DLP and RMS
- Select and associate an RMS template for use with DLP