Data Encryption and Data Masking

Data Encryption and Data Masking

For the Actian Database products, Actian X, Actian Vector and Actian Data Platfomr, data can be encrypted at the database level, column level and data can also be masked. In this video we introduce each method.

rate limit

Code not recognized.

About this course

Course Outcome:
You will have an understanding of how to apply encryption functionality across the Actian database products Actian X, Vector and Actian Data Platform. Data can be encrypted at any of the following levels or a combination of levels to suit your use case:
  • DBMS Level (Data at Rest) Encryption
    • Full Database Encryption
    • Individual Column Encryption
  • Application Level / Function-Based Encryption
    • AES_ENCRYPT_IV / AES_DECRYPT_IV
    • Column Masking
Course Style:
This course provides the insight you require to get you started with data encryption techniques provided within the Actian database product set.
Audience:
This course is for administrators, developers and advanced users whose job it is to ensure that the corporate data remains safe and secure.
Prerequisites:
  • The video assumes you have access to an Actian database and that you are an administrator of that database.
Supplementary Resources:

Curriculum16 min

  • DBMS Level Encryption 3 min
  • Column Level Encryption 2 min
  • Application Level Encryption 3 min
  • Column Masking 3 min
  • Documentation
  • Data Encryption 5 min
  • Feedback
  • Take Course Survey

About this course

Course Outcome:
You will have an understanding of how to apply encryption functionality across the Actian database products Actian X, Vector and Actian Data Platform. Data can be encrypted at any of the following levels or a combination of levels to suit your use case:
  • DBMS Level (Data at Rest) Encryption
    • Full Database Encryption
    • Individual Column Encryption
  • Application Level / Function-Based Encryption
    • AES_ENCRYPT_IV / AES_DECRYPT_IV
    • Column Masking
Course Style:
This course provides the insight you require to get you started with data encryption techniques provided within the Actian database product set.
Audience:
This course is for administrators, developers and advanced users whose job it is to ensure that the corporate data remains safe and secure.
Prerequisites:
  • The video assumes you have access to an Actian database and that you are an administrator of that database.
Supplementary Resources:

Curriculum16 min

  • DBMS Level Encryption 3 min
  • Column Level Encryption 2 min
  • Application Level Encryption 3 min
  • Column Masking 3 min
  • Documentation
  • Data Encryption 5 min
  • Feedback
  • Take Course Survey