Data Life Cycle Management

Learn the fundamental processes and best practices to develop a data life cycle management plan for your organization. Managing business information through its life cycle from requirements through...

Read More
$2,495 USD
Course Code DATA-LC-MGMT
Duration 3 days
Available Formats Classroom
6695 Reviews star_rate star_rate star_rate star_rate star_half
Course Image

Learn the fundamental processes and best practices to develop a data life cycle management plan for your organization. Managing business information through its life cycle from requirements through retirement is the data lifecycle management process. In order to use data to support business goals with minimal risk, managing information properly over its lifetime equips organizations with the right information. The vast amounts of data, and growing, that businesses must understand underpins the emergent notion that organizations must put appropriate processes into place for effective data lifecycle management. In this three-day course, you will dig through fundamental data management processes, best practices, and methods that enable you to develop a data management plan for your organization. Not only will you be able to develop an effective data management plan, you will go back to work with the practices and methods to effectively create, organize, manage, preserve, and share data. By having the right skills, processes, and practices you will be able to address the organizational challenges of reducing risk, costs, and increasing organizational responsiveness.

Skills Gained

  • Develop a data life cycle management plan for your organization
  • Create, organize, manage, preserve, and share data with key stakeholders
  • Determine best practices and methods to reduce risk and cost.
  • Identify storage architectures and their appropriate use
  • Identify key business data and make crucial decisions
  • Develop data cleansing and transformation plans
  • Analyze security and privacy management for your organization's data
  • Configure reporting methods

Who Can Benefit

  • Data Managers
  • Data Management Analysts
  • Database Administrators
  • Data Architects
  • Data Scientist
  • Business Analysts
  • Business managers and leaders
  • PMO Managers
  • CIO, CTO, Directors of IT

Prerequisites

There are no prerequisites for this class, however, it is recommended students come prepared knowing how data in their current organization is managed.

Course Details

Part 1: Introduction to Life Cycle Management

Recognizing the vital stages in the start to end life cycle of data and storage Architectures

  • Understand why it is important to manage data
  • Understand and explore the stages in the data lifecycle
  • Plan, Collect, Assure, Describe, Preserve, Discover, Integrate, Analyze
  • Understand the key storage architectures
  • Distinguish the pros/cons of using different architectures
  • Exercise: Practice identifying elements of data life cycle and their function
  • Exercise: Practice identifying storage architectures and their appropriate use

Importance of architecture, analysis, and desig

  • Differentiate between core architectures
  • Understand the importance of analysis and how to use it to guide data management decisions
  • Understand strategies for translating analysis and design
  • Exercise: Identifying architectures
  • Exercise: Practice analysis process and design process

Recognize data as a key business asset

  • Identify data as a business asset
  • Learn to prioritize data assets
  • Exercise: Identifying key business data
  • Exercise: Prioritizing data

Stewardship and governance of data Through the Lifecycle

  • Core Data Stewardship Concepts
  • Data quality, integrity, accessibility and security
  • Core elements of a data governance plan
  • Data protection, risk assessment, compliance requirements, stakeholder management and access management
  • Exercise: Identifying data governance principles
  • Exercise: Identifying data stewardship principles

Part 2: Database Design

Designing provisioning workflows

  • Explore principles of Agile Provisioning
  • Inspect provisioning workflows
  • Provisioning best practices

Data cleansing and transformation

  • Principles of data cleansing and data transformation
  • Data cleansing best practices
  • Data transformation planning
  • Exercise: Design provisioning workflows
  • Exercise: Develop data cleansing and transformation plans

Designing patching workflows

  • Core elements of developing a patch plan
  • Implications of a poorly designed patch workflow
  • Patch management best practices

Ensuring the quality and integrity of data

  • Fundamentals of quality and integrity in data
  • Data quality best practices
  • Data integrity best practices
  • Exercise: Design patching workflows
  • Exercise: Practice data quality and integrity planning

Data security and management

  • Best practices in data security management
  • Approaches to privacy management
  • Data security and privacy management planning

Provisioning new databases from reference systems

  • Analyzing reference systems for requirements
  • Considerations when developing a provisioning plan from reference systems
  • Exercise: Analyze security and privacy management plans
  • Exercise: Practice provisioning from reference systems

Part 3: Configuration and Change Management

Defining a gold standard and baseline configuration

  • Explore data standard best practices
  • Examine considerations for a baseline data configuration
  • Learn core aspects of a solid data development methodology

Change activity planning

  • Plan Change Activity, including starting and end dates; creating assigning and tracking task status
  • Learn to manage large numbers of task and targets
  • Learn to monitor your plans for potential delays and quickly evaluate overall plan status
  • Exercise: Best Practices in standards and baseline configurations
  • Exercise: Change Activity Planning

Patch management

  • Learn the core elements of a patch management process
  • Detect
  • Assess
  • Acquire
  • Test
  • Deploy
  • Maintain
  • Monitoring vulnerabilities, remediation’s and threats

Pre-deployment analysis

  • Learn core elements of a pre-deployment plan
  • Best practices in pre-deployment analysis
  • Exercise: Practice analyzing patch management plans
  • Exercise: Practice analyzing pre-deployment analysis

Managing the rollout

  • Foundations of a successful roll-out plan
  • Potential pitfalls that affect roll-outs
  • Explore steps in a standard roll-out plan

Reporting status and conflict resolution

  • Strategies for status reporting
  • Core techniques in conflict resolution
  • Best practices with regards to conflict resolution
  • Explore components of a conflict resolution plan
  • Exercise: Practice analyzing roll-out plans, status reporting plans, and conflict resolution plans

Part 4: Compliance Management

Compliance standards

  • Core elements of compliance standards
  • Work towards a compliance framework
  • Examine compliance standards rules
  • Exercise: Practice analyzing compliance standards
  • Exercise: Practice analyzing the elements of a compliance framework
  • Exercise: Practice developing conceptual compliance standards rules

Security and configuration reporting best practices

  • Best practices in security reporting
  • Best practices in configuration reporting
  • Exercise: Practice analyzing security reporting methods
  • Exercise: Practice analyzing configuration reporting methods

Detecting unauthorized changes

  • Principles of data auditing and DAM (Database Activity Monitoring)
  • Explore common techniques for data auditing within databases
  • Examine database logs for unauthorized changes
  • Developing policies to manage unauthorized access
  • Exercise: Practice applying database activity monitoring principles
  • Exercise: Practice examining database logs
  • Exercise: Practice developing access policies

Part 5: Disaster Protection

Building for availability

  • System design considerations for availability
  • Overview of high available methodologies
  • Explore available design and management best practices
  • Exercise: Practice analyzing system design considerations
  • Exercise: Practice analyzing high availability methodologies
  • Exercise: Practicing analyzing availability design and management best practices

Automating a complete site failover

  • Core principles in automating a complete site failover
  • Site failover automation methodologies
  • Best practices in automation of complete site failover
  • Exercise: Practice analyzing core principles of automating a complete site failover
  • Exercise: Practice distinguishing between site failover automation methodologies
  • Exercise: Practice identifying best practices

Minimizing risk

  • Core concepts in data risk management
  • Fundamental elements of a data risk management plan
  • Data risk management best practices
  • Exercise: Practice identifying core concepts in data risk management
  • Exercise: Practice developing elements of a data risk management plan
  • Exercise: Practice identifying best practices
Contact Us 1-800-803-3948
Contact Us
FAQ Get immediate answers to our most frequently asked qestions. View FAQs arrow_forward