Data Life Cycle Management

3 Day Classroom  •  4 Day Live Online
3 Day Training at your location.
Adjustable to meet your needs.
Individual:
$2495.00
Group Rate:
$2295.00
GSA Discount:
$1821.35
When training eight or more people, onsite team training offers a more affordable and convenient option.
Register Now
Request Quote
Individual
Onsite
Overview

Managing business information through its lifecycle from requirements through retirement is the data lifecycle management process. In order use data to support business goals with minimal risk, managing information properly over its lifetime equips organizations with the right information. The vast amounts of data, and growing, that businesses must understand underpins the emergent notion that organizations must put appropriate processes into place for effective data lifecycle management.

In this three day course, you will dig through fundamental data management processes, best practices and methods that will enable you to develop a data management plan for your organization. Not only will you be able to develop an effective data management plan, you will go back to work with the practices and methods to effectively create, organize, manage, preserve and share data. By having the right skills, processes and practices you will be able to address the organization challenges of reducing risk, costs and increasing organizational responsiveness. 

Upcoming Dates and Locations
Guaranteed To Run

There aren’t any public sessions currently scheduled for this course, but if you fill out the form below, we can tell you about how we can bring this course to you!

Course Outline

Part 1 – Introduction to Lifecycle Management

1. Recognizing the Vital Stages in the Start to End Lifecycle of Data and Storage Architectures

  • Understand why it is important to manage data
  • Understand and explore the stages in the data lifecycle
    • Plan, Collect, Assure, Describe, Preserve, Discover, Integrate,  Analyze
  • Understand the key storage architectures
  • Distinguish the pros/cons of using different architectures

Exercises:

  • Practice identifying elements of data lifecycle and their function
  • Practice identifying storage architectures and their appropriate use

2. Importance of Architecture, Analysis and Design

  • Differentiate between core architectures
  • Understand the importance of analysis and how to use it to guide data management decisions
  • Understand strategies for translating analysis and design

Exercises:

  • Identifying architectures
  • Practice analysis process and design process

3. Recognize Data as a Key Business Asset

  • Identify data as a business asset
  • Learn to prioritize data assets

Exercises:

  • Identifying key business data
  • Prioritizing data

4. Stewardship and Governance of Data Through the Lifecycle

  • Core Data Stewardship Concepts
    • Data quality, integrity, accessibility and security
  • Core elements of a data governance plan
    • Data protection, risk assessment, compliance requirements, stakeholder management and access management

Exercises:

  • Identifying  data governance principles
  • Identifying data stewardship principles

Part 2 – Database Design

  1. Designing Provisioning Workflows
    • Explore principles of Agile Provisioning
    • Inspect provisioning workflows
    • Provisioning best practices
  2. Data Cleansing and Transformation
    • Principles of data cleansing and data transformation
    • Data cleansing best practices
    • Data transformation planning

Exercises:

  • Design provisioning workflows
  • Develop data cleansing and transformation plans

3.    Designing Patching Workflows

  • Core elements of developing a patch plan
  • Implications of a poorly designed patch workflow
  • Patch management best practices

4.    Ensuring Quality and Integrity of Data

  • Fundamentals of quality and integrity in data
  • Data quality best practices
  • Data integrity best practices

Exercises:

  • Design patching workflows
  • Practice data quality and integrity planning

5. Data Security and Management

  • Best practices in data security management
  • Approaches to privacy management
  • Data security and privacy management planning

6. Provisioning New Databases from Reference Systems

  • Analyzing reference systems for requirements
  • Considerations when developing a provisioning plan from reference systems

Exercises:

  • Analyze security and privacy management plans
  • Practice provisioning from reference systems

Part 3 – Configuration and Change Management

1. Defining a Gold Standard and Baseline Configuration

  • Explore data standard best practices
  • Examine considerations for a baseline data configuration
  • Learn core aspects of a solid data development methodology

2. Change Activity Planning

  • Plan Change Activity, including starting and end dates; creating assigning and tracking task status
  • Learn to manage large numbers of task and targets
  • Learn to monitor your plans for potential delays and quickly evaluate overall plan status

Exercises:

  • Best Practices in standards and baseline configurations
  • Change Activity Planning

3. Patch Management

  • Learn the core elements of a patch management process
    • Detect
    • Assess
    • Acquire
    • Test
    • Deploy
    • Maintain
  • Monitoring vulnerabilities, remediation’s and threats

4. Pre-Deployment Analysis

  • Learn core elements of a pre-deployment plan
  • Best practices in pre-deployment analysis

Exercises:

  • Practice analyzing patch management plans
  • Practice analyzing pre-deployment analysis

5. Pre-Deployment Analysis

  • Core elements of a pre-deployment plan
  • Best practices in a pre-deployment plan

Exercises:

  • Practice analyzing patch management plans
  • Practice analyzing pre-deployment plans

6. Managing the Rollout

  • Foundations of a successful roll-out plan
  • Potential pitfalls that affect roll-outs
  • Explore steps in a standard roll-out plan

 7. Reporting Status and Conflict Resolution

  • Strategies for status reporting
  • Core techniques in conflict resolution
  • Best practices with regards to conflict resolution
  • Explore components of a conflict resolution plan

Exercises:

  • Practice analyzing roll-out plans, status reporting plans and conflict resolution plans

Part 4 – Compliance Management

1. Compliance Standards

  • Core elements of compliance standards
  • Work towards a compliance framework
  • Examine compliance standards rules

Exercises:

  • Practice analyzing compliance standards
  • Practice analyzing the elements of a compliance framework
  • Practice developing conceptual compliance standards rules

2. Security and Configuration Reporting Best Practices

  • Best practices in security reporting
  • Best practices in configuration reporting

Exercises:

  • Practice analyzing security reporting methods
  • Practice analyzing configuration reporting methods

3. Detecting Unauthorized Changes

  • Principles of data auditing and DAM (Database Activity Monitoring)
  • Explore common techniques for data auditing within databases
  • Examine database logs for unauthorized changes
  • Developing policies to manage unauthorized access

Exercises:

  • Practice applying database activity monitoring principles
  • Practice examining database logs
  • Practice developing access policies

Part 5 – Disaster Protection

1. Building for Availability

  • System design considerations for availability
  • Overview of high available methodologies
  • Explore available design and management best practices

Exercises:

  • Practice analyzing system design considerations
  • Practice analyzing high availability methodologies
  • Practicing analyzing availability design and management best practices

2. Automating a Complete Site Failover

  • Core principles in automating a complete site failover
  • Site failover automation methodologies
  • Best practices in automation of complete site failover

Exercises:

  • Practice analyzing core principles of automating a complete site failover
  • Practice distinguishing between site failover automation methodologies
  • Practice identifying best practices

3. Minimizing Risk

  • Core concepts in data risk management
  • Fundamental elements of a data risk management plan
  • Data risk management best practices

Exercises:

  • Practice identifying core concepts in data risk management
  • Practice developing elements of a data risk management plan
  • Practice identifying best practices

 

Who should attend
  • Data Managers
  • Data Management Analysts
  • Database Administrators
  • Data Architects
  • Data Scientist
  • Business Analysts
  • Business managers and leaders
  • PMO Managers
  • CIO, CTO, Directors of IT
  • Anyone interested in data management