Search icon
Subscription
0
Cart icon
Close icon
You have no products in your basket yet
Arrow left icon
All Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Newsletters
Free Learning
Arrow right icon
Azure Data Engineer Associate Certification Guide

You're reading from  Azure Data Engineer Associate Certification Guide

Product type Book
Published in Feb 2022
Publisher Packt
ISBN-13 9781801816069
Pages 574 pages
Edition 1st Edition
Languages
Concepts
Author (1):
Newton Alex Newton Alex
Profile icon Newton Alex

Table of Contents (23) Chapters

Preface 1. Part 1: Azure Basics
2. Chapter 1: Introducing Azure Basics 3. Part 2: Data Storage
4. Chapter 2: Designing a Data Storage Structure 5. Chapter 3: Designing a Partition Strategy 6. Chapter 4: Designing the Serving Layer 7. Chapter 5: Implementing Physical Data Storage Structures 8. Chapter 6: Implementing Logical Data Structures 9. Chapter 7: Implementing the Serving Layer 10. Part 3: Design and Develop Data Processing (25-30%)
11. Chapter 8: Ingesting and Transforming Data 12. Chapter 9: Designing and Developing a Batch Processing Solution 13. Chapter 10: Designing and Developing a Stream Processing Solution 14. Chapter 11: Managing Batches and Pipelines 15. Part 4: Design and Implement Data Security (10-15%)
16. Chapter 12: Designing Security for Data Policies and Standards 17. Part 5: Monitor and Optimize Data Storage and Data Processing (10-15%)
18. Chapter 13: Monitoring Data Storage and Data Processing 19. Chapter 14: Optimizing and Troubleshooting Data Storage and Data Processing 20. Part 6: Practice Exercises
21. Chapter 15: Sample Questions with Solutions 22. Other Books You May Enjoy

Chapter 12: Designing Security for Data Policies and Standards

Welcome to the next section of the syllabus, Design and Implement Data Security. This section accounts for about 10–15% of the questions in the certification. According to the syllabus, this section is supposed to have two chapters: one focusing on the design aspects, and another focusing on implementation aspects. But, to ensure a better flow of topics and to avoid too many context switches, I've merged both the design and implementation details into this single chapter. Once you have completed this chapter, you should be able to recognize sensitive information and be able to design and implement various sensitive information-handling techniques such as data masking, row and column level security, implementing role-based access and access-controlled lists, enabling encryption and more. You will also be aware of the good practices for handling keys, secrets, and certificates, and understand the low-level implementation...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $15.99/month. Cancel anytime}