YoVDO

The Power BI Secret Sauce: Security and Governance Features

Offered By: SQLBits via YouTube

Tags

Cloud Computing Courses Network Security Courses Microsoft Azure Courses Governance Courses Data Security Courses Auditing Courses Data Encryption Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Discover the security and governance features of Power BI in this 49-minute conference talk from SQLBits. Explore how to effectively communicate with your security team about Power BI's built-in security measures, enabling safe cloud data uploads and self-service capabilities. Delve into enterprise self-service, Microsoft security scale, authentication processes, and external user access control. Examine various data types in Power BI, encryption methods, network security, and controlled data residency. Learn about full auditability, information protection policies, data loss prevention, and integration with Microsoft Purview. Gain insights from Kasper de Jonge, Principal Program Manager on the Power BI team at Microsoft, on securing the entire data journey from Azure to Office and embracing supportive certifications.

Syllabus

Intro
Power BI is managing your organizations data.. Enterprise self service Bl
The scale of Microsoft security
How do I know who authenticates?
External User Access Control
Admin Control
Types of data in Power BI
How Power BI handles data
What types of data at rest are there?
How is the data encrypted?
Network security
Controlled Data Residency
Full Auditability
Information Protection in Power BI
Securing the full data journey from Azure to Office
Information protection policies in Power BI
Data loss prevention policies
Microsoft Purview Data Catalog
Microsoft Purview Data Map
Instead embrace and support
Certifications


Taught by

SQLBits

Related Courses

An Introduction to Computer Networks
Stanford University via Independent
Computer Networks
University of Washington via Coursera
Computer Networking
Georgia Institute of Technology via Udacity
Cybersecurity and Its Ten Domains
University System of Georgia via Coursera
Model Building and Validation
AT&T via Udacity