Business Skills - Data Life Cycle Management
Managing business information through its lifecycle from requirements through retirement is the data lifecycle management process. In order use data to support business goals with minimal risk, managing information properly over its lifetime equips organizations with the right information. The vast amounts of data, and growing, that businesses must understand underpins the emergent notion that organizations must put appropriate processes into place for effective data lifecycle management. In this three day course, you will dig through fundamental data management processes, best practices and methods that will enable you to develop a data management plan for your organization. Not only will you be able to develop an effective data management plan, you will go back to work with the practices and methods to effectively create, organize, manage, preserve and share data. By having the right skills, processes and practices you will be able to address the organization challenges of reducing risk, costs and increasing organizational responsiveness.
Duration: 25-30hrs
Course Content:
Part 1 – Introduction to Lifecycle Management
1. Recognizing the Vital Stages in the Start to End Lifecycle of Data and Storage Architectures
Understand why it is important to manage data
Understand and explore the stages in the data lifecycle
Plan, Collect, Assure, Describe, Preserve, Discover, Integrate, Analyze
Understand the key storage architectures
Distinguish the pros/cons of using different architectures
Exercise: Practice identifying elements of data lifecycle and their function
Exercise: Practice identifying storage architectures and their appropriate use
2. Importance of Architecture, Analysis and Design
Differentiate between core architectures
Understand the importance of analysis and how to use it to guide data management decisions
Understand strategies for translating analysis and design
Exercise: Identifying architectures
Exercise: Practice analysis process and design process
3. Recognize Data as a Key Business Asset
Identify data as a business asset
Learn to prioritize data assets
Exercise: Identifying key business data
Exercise: Prioritizing data
4. Stewardship and Governance of Data Through the Lifecycle
Core Data Stewardship Concepts
Data quality, integrity, accessibility and security
Core elements of a data governance plan
Data protection, risk assessment, compliance requirements, stakeholder management and access management
Exercise: Identifying data governance principles
Exercise: Identifying data stewardship principles
Part 2 – Database Design
1. Designing Provisioning Workflows
Explore principles of Agile Provisioning
Inspect provisioning workflows
Provisioning best practices
2. Data Cleansing and Transformation
Principles of data cleansing and data transformation
Data cleansing best practices
Data transformation planning
Exercise: Design provisioning workflows
Exercise: Develop data cleansing and transformation plans
3. Designing Patching Workflows
Core elements of developing a patch plan
Implications of a poorly designed patch workflow
Patch management best practices
4. Ensuring Quality and Integrity of Data
Fundamentals of quality and integrity in data
Data quality best practices
Data integrity best practices
Exercise: Design patching workflows
Exercise: Practice data quality and integrity planning
5. Data Security and Management
Best practices in data security management
Approaches to privacy management
Data security and privacy management planning
6. Provisioning New Databases from Reference Systems
Analyzing reference systems for requirements
Considerations when developing a provisioning plan from reference systems
Exercise: Analyze security and privacy management plans
Exercise: Practice provisioning from reference systems
Part 3 – Configuration and Change Management
1. Defining a Gold Standard and Baseline Configuration
Explore data standard best practices
Examine considerations for a baseline data configuration
Learn core aspects of a solid data development methodology
2. Change Activity Planning
Plan Change Activity, including starting and end dates; creating assigning and tracking task status
Learn to manage large numbers of task and targets
Learn to monitor your plans for potential delays and quickly evaluate overall plan status
Exercise: Best Practices in standards and baseline configurations
Exercise: Change Activity Planning
3. Patch Management
Learn the core elements of a patch management process (Detect, Assess, Acquire, Test, Deploy, Maintain)
Monitoring vulnerabilities, remediation’s and threats
4. Pre-Deployment Analysis
Learn core elements of a pre-deployment plan
Best practices in pre-deployment analysis
Exercise: Practice analyzing patch management plans
Exercise: Practice analyzing pre-deployment analysis
5. Pre-Deployment Analysis
Core elements of a pre-deployment plan
Best practices in a pre-deployment plan
Exercise: Practice analyzing patch management plans
Exercise: Practice analyzing pre-deployment plans
6. Managing the Rollout
Foundations of a successful roll-out plan
Potential pitfalls that affect roll-outs
Explore steps in a standard roll-out plan
7. Reporting Status and Conflict Resolution
Strategies for status reporting
Core techniques in conflict resolution
Best practices with regards to conflict resolution
Explore components of a conflict resolution plan
Exercise: Practice analyzing roll-out plans, status reporting plans and conflict resolution plans
1. Designing Provisioning Workflows
Explore principles of Agile Provisioning
Inspect provisioning workflows
Provisioning best practices
2. Data Cleansing and Transformation
Principles of data cleansing and data transformation
Data cleansing best practices
Data transformation planning
Exercise: Design provisioning workflows
Exercise: Develop data cleansing and transformation plans
3. Designing Patching Workflows
Core elements of developing a patch plan
Implications of a poorly designed patch workflow
Patch management best practices
4. Ensuring Quality and Integrity of Data
Fundamentals of quality and integrity in data
Data quality best practices
Data integrity best practices
Exercise: Design patching workflows
Exercise: Practice data quality and integrity planning
5. Data Security and Management
Best practices in data security management
Approaches to privacy management
Data security and privacy management planning
6. Provisioning New Databases from Reference Systems
Analyzing reference systems for requirements
Considerations when developing a provisioning plan from reference systems
Exercise: Analyze security and privacy management plans
Exercise: Practice provisioning from reference systems
Part 3 – Configuration and Change Management
1. Defining a Gold Standard and Baseline Configuration
Explore data standard best practices
Examine considerations for a baseline data configuration
Learn core aspects of a solid data development methodology
2. Change Activity Planning
Plan Change Activity, including starting and end dates; creating assigning and tracking task status
Learn to manage large numbers of task and targets
Learn to monitor your plans for potential delays and quickly evaluate overall plan status
Exercise: Best Practices in standards and baseline configurations
Exercise: Change Activity Planning
3. Patch Management
Learn the core elements of a patch management process (Detect, Assess, Acquire, Test, Deploy, Maintain)
Monitoring vulnerabilities, remediation’s and threats
4. Pre-Deployment Analysis
Learn core elements of a pre-deployment plan
Best practices in pre-deployment analysis
Exercise: Practice analyzing patch management plans
Exercise: Practice analyzing pre-deployment analysis
5. Pre-Deployment Analysis
Core elements of a pre-deployment plan
Best practices in a pre-deployment plan
Exercise: Practice analyzing patch management plans
Exercise: Practice analyzing pre-deployment plans
6. Managing the Rollout
Foundations of a successful roll-out plan
Potential pitfalls that affect roll-outs
Explore steps in a standard roll-out plan
7. Reporting Status and Conflict Resolution
Strategies for status reporting
Core techniques in conflict resolution
Best practices with regards to conflict resolution
Explore components of a conflict resolution plan
Exercise: Practice analyzing roll-out plans, status reporting plans and conflict resolution plans
Part 4 – Compliance Management
1. Compliance Standards
Core elements of compliance standards
Work towards a compliance framework
Examine compliance standards rules
Exercise: Practice analyzing compliance standards
Exercise: Practice analyzing the elements of a compliance framework
Exercise: Practice developing conceptual compliance standards rules
2. Security and Configuration Reporting Best Practices
Best practices in security reporting
Best practices in configuration reporting
Exercise: Practice analyzing security reporting methods
Exercise: Practice analyzing configuration reporting methods
3. Detecting Unauthorized Changes
Principles of data auditing and DAM (Database Activity Monitoring)
Explore common techniques for data auditing within databases
Examine database logs for unauthorized changes
Developing policies to manage unauthorized access
Exercise: Practice applying database activity monitoring principles
Exercise: Practice examining database logs
Exercise: Practice developing access policies
Part 5 – Disaster Protection
1. Building for Availability
System design considerations for availability
Overview of high available methodologies
Explore available design and management best practices
Exercise: Practice analyzing system design considerations
Exercise: Practice analyzing high availability methodologies
Exercise: Practicing analyzing availability design and management best practices
2. Automating a Complete Site Failover
Core principles in automating a complete site failover
Site failover automation methodologies
Best practices in automation of complete site failover
Exercise: Practice analyzing core principles of automating a complete site failover
Exercise: Practice distinguishing between site failover automation methodologies
Exercise: Practice identifying best practices
3. Minimizing Risk
Core concepts in data risk management
Fundamental elements of a data risk management plan
Data risk management best practices
Exercise: Practice identifying core concepts in data risk management
Exercise: Practice developing elements of a data risk management plan
Exercise: Practice identifying best practices
1. Compliance Standards
Core elements of compliance standards
Work towards a compliance framework
Examine compliance standards rules
Exercise: Practice analyzing compliance standards
Exercise: Practice analyzing the elements of a compliance framework
Exercise: Practice developing conceptual compliance standards rules
2. Security and Configuration Reporting Best Practices
Best practices in security reporting
Best practices in configuration reporting
Exercise: Practice analyzing security reporting methods
Exercise: Practice analyzing configuration reporting methods
3. Detecting Unauthorized Changes
Principles of data auditing and DAM (Database Activity Monitoring)
Explore common techniques for data auditing within databases
Examine database logs for unauthorized changes
Developing policies to manage unauthorized access
Exercise: Practice applying database activity monitoring principles
Exercise: Practice examining database logs
Exercise: Practice developing access policies
Part 5 – Disaster Protection
1. Building for Availability
System design considerations for availability
Overview of high available methodologies
Explore available design and management best practices
Exercise: Practice analyzing system design considerations
Exercise: Practice analyzing high availability methodologies
Exercise: Practicing analyzing availability design and management best practices
2. Automating a Complete Site Failover
Core principles in automating a complete site failover
Site failover automation methodologies
Best practices in automation of complete site failover
Exercise: Practice analyzing core principles of automating a complete site failover
Exercise: Practice distinguishing between site failover automation methodologies
Exercise: Practice identifying best practices
3. Minimizing Risk
Core concepts in data risk management
Fundamental elements of a data risk management plan
Data risk management best practices
Exercise: Practice identifying core concepts in data risk management
Exercise: Practice developing elements of a data risk management plan
Exercise: Practice identifying best practices