Data Access Management

onDemand eLearning | IDMC Data Integration & Governance | Self-Paced | February 2025 Release

Course Overview

Explore how Data Access Management can deliver data protection and ensure safe use of data within Data Integration and Data Marketplace in IDMC.
Understand the foundations of Data Access Management and the dependencies that exist with Cloud Data Governance and Catalog and Cloud Data Marketplace.
Become familiar with Data Access Management Rules, Data Protections, and Policies and discover self-service of protected data through Cloud Data Marketplace and how sensitive or confidential data can be made available in a mapping.
This course is applicable to February 2025 Release.

Objectives

After successfully completing this course, students should be able to:

  • Identify the challenges of Data Privacy and Data Access
  • Describe foundational prerequisites in CDGC and CDMP
  • Describe CDAM Use cases
  • Explore the user interface
  • Review Data Protections and Data Access Policies
  • Describe how protected data can be delivered mapping in CDI
  • Review Custom Data Protections
  • Describe Rules
  • Request access to protected data in CDMP

Target Audience

  • Data Analyst
  • Data Scientist
  • Data Steward

Prerequisites

  • None
Agenda
Module 1: Introduction to Data Access Management
  • Introduction to Data Access Management
  • Benefits of Data Access Management
  • Data Access Management and IDMC
  • User Roles
  • Terms and Services in IDMC – Foundation, Enforcement & Delivery
Module 2: Defining Data Access Management
  • Terms used in Data Access Management
  • Describe Data Filters
  • Define Data De-identifications and Data Protections
 
Module 3: Delivery: Data Integration
  • Describe a Mapping in CDI
  • Identify the Access Policy Transformation
  • Define the Process of transforming Data in CDI
Module 4: Delivery: Self-Service
  • Review CDMP Settings
  • Describe the Process of Searching and Ordering Data Collections
  • Review Data Self-Service using Managed Access
Module 5: Delivery: Native Enforcement
  • Describe Data Access Controls
  • Describe the Process of natively restricting access to Data (tables and views)


Enroll Now

Back to Course Overview

Power User Axon for Community Users (Instructor Led or onDemand) Axon Content Curation (Instructor Led) Axon for Power Users (Instructor Led) Axon Data Governance (Professional Certification) Axon Data Governance (Professional Certification) Axon Data Governance (Professional Certification) Some more content to make this bigger asdf asdf asdf

Informatica offers programs to extend learning in convenient and economic packages. Programs include self-paced subscriptions as well as bundled instructor led training and certifications. Each program is curated around a specific skillset to enable customer success.

365University Data Governance Annual Subscription

Informatica MasterPass Education Subscription

Informatica Learning Library

Data Governance & Privacy Journey Master

View Full Course Offerings