Skip to content

Contact sales

By filling out this form and clicking submit, you acknowledge our privacy policy.

Data Governance and Management

Course Summary

The Data Governance and Management training course is designed to demonstrate the aspects of Data Management and Data Governance key concepts along with preaching the best practices of implementing these practices in their Data Strategy.

The course begins with a holistic view of data management and data governance. Next, it continues with a look at modeling, discovering, archiving and planning data. The course concludes with a look at how to handle Personal Identifiable Information (PII).

Purpose
Promote an in-depth understanding of data governance and management.
Audience
Data Analysts, Data Engineers, Data Architects and Business Analysts looking to improve their knowledge and skills around data governance and management.
Role
Business Analyst - Data Engineer
Skill Level
Intermediate
Style
Workshops
Duration
3 Days

 

Productivity Objectives
  • Govern data within data driven organizations
  • Manage data and make it fit within the organization
  • Handle metadata efficiently to make working with data easier

What You'll Learn:

In the Data Governance and Management training course, you'll learn:
  • Holistic View of Data Management and Data Governance
    • Introduction to realm of data and metadata
    • Terms & concepts
    • Key areas to consider
    • Architecture of a typical data project
    • Key roles
    • Ecosystem of tools to manage and govern data effectively
  • Modeling the Data
    • Model the FileSystem
    • Application centric models
    • Nomenclature - files/directory structure
    • File/directory layout
    • Various file formats
    • Share the data
    • Challenges of sharing
    • Ensure single version of truth
    • Protect confidentiality
    • Data ownership
  • Discovering the Data
    • Challenges in data discovery
    • Role of data catalogue
    • Key data catalogues
    • Work with data catalogue
  • Data Archiving
    • Key data archival strategies
    • Challenges with Data Archiving
    • Maintain integrity and authenticity
    • Explore metadata
    • Display Trustworthiness
    • Best practices for data curation
  • Planning Data Management
    • Understand Data Management importance
    • Data Management Stakeholders
    • Best practices in Data Management
    • Different Tools required
  • Master Data Management
    • Introduction to Master Data
    • Understand Master Information
    • Get familiar with Master Data Management (MDM)
    • Explore MDM Application
    • Data quality in MDM
    • Importance and advantages
  • Master Data Management Architecture
    • MDM Architecture
    • System Architecture of MDM
    • Batch Jobs at MDM
    • Work with Flow of Data
  • Classification, Information Types, and Approaches
    • Information classification
    • Types of master information
    • Various approaches of MDM
    • Compare various approaches of MDM
  • Master Data Management Maturity Model
    • MDM Maturity Model
    • Levels of maturity model
    • Build blocks of MDM
    • MDM component layer model
    • Myths of MDM
  • Governing your Data
    • Enter the data governance world
    • Why data governance?
    • Ten facets of data governance
    • Value proposition for data governance
    • Key areas of data governance
    • Major tools available
  • Implementing Data Governance
    • Structuring organizations with data roles
    • Implementation development
    • Draft charters
    • Various approaches to governing the data
    • Healthy data maintenance
    • Measure and review data governance strategy
  • Data Security
    • Make data secure
    • Authentication
    • Authorization
    • Encryption at Rest
    • Encryption in Motion
  • Auditing the Data
    • Audit in form of assurance
    • High-Quality auditing demand
    • Audit risk and materiality
    • The value of audits
  • Handling Personal Identifiable Information (PII)
    • Understand what is PII
    • Non-Personal Information
    • Identify PII
    • Associate sensitive data associated with PII
    • Handle PII
“I appreciated the instructor's technique of writing live code examples rather than using fixed slide decks to present the material.”

VMware

Dive in and learn more

When transforming your workforce, it's important to have expert advice and tailored solutions. We can help. Tell us your unique needs and we'll explore ways to address them.

Let's chat

By filling out this form and clicking submit, you acknowledge our privacy policy.