Call : (+91) 968636 4243
Mail :

Informatica - Data Privacy Management

( Duration: 3 Days )

In Informatica - Data Privacy Management training course, you will learn to discover, classify, analyze, and monitor personal and sensitive data across organization and gain skills to configure locations, data stores, data store groups, and extensions. Create data domains, classification policies, and run scans and jobs to discover sensitive data. Detect anomalies, monitor security policies, and user activity, and identify subject data.

By attending Informatica - Data Privacy Management workshop, delegates will learn to:

  • Describe the functional architecture of DPM
  • Articulate the core features and benefits of the product
  • Create and manage locations
  • Manage data stores and data group assignments
  • Manage Extensions
  • Identify and manage data domains and classification policies
  • Manage column sensitivity
  • Detect sensitive data in different sources
  • Create and manage scans and jobs
  • Create and manage security policies and security policy violations
  • Manage anomalies and suppression rules
  • Create and manage actions
  • Understand the functionality of ServiceNow extension
  • Customize and manage the Dashboard
  • Log and monitor user activity
  • Configure Subject Registry
  • Create Data Subject Access Request

The Informatica - Data Privacy Management class is ideal for:

  • Administrators
  • Business Analysts
  • End Users



Introduction to Data Privacy Management

  • Data Privacy Management (DPM) features and benefits
  • DPM functional architecture
  • DPM and Hadoop ecosystem
  • Subject Registry Architecture
  • DPM User Interface


  • System settings
  • Locations
  • Data store groups
  • Extensions
  • Remote agents
  • Data domains
  • Classification policies
  • Actions


  • Data stores
  • Detection of sensitive data
  • Scans
  • Job types
  • Job management
  • Column Sensitivity
  • Always Sensitive/Never Sensitive workspace
  • Risk score factor weightage
  • ServiceNow extension

Security Policy Framework

  • Security policy framework
  • Security policy types
  • Security policy group
  • Security policy violations
  • Anomalies
  • Suppression Rules workspace

Security Dashboard

  • Customization of Security Dashboard
  • Sensitive data grouping and indicators
  • Summary analytics
  • Global tagging and filtering

User Access

  • Key components of user access (Users, Groups, Group memberships, User access, User aliases)
  • User Access Widget
  • Types of integration

User Activity

  • Overview of user activity
  • User activity concepts
  • Top users
  • Impressions
  • Log user activity

Subject Registry Onboarding

  • Subject registry
  • Subject data
  • Subject type

Privacy Operations

  • Search subjects
  • Data Subject Access Request (DSAR)
  • Delegate actions
  • Legal holds
  • Third party shares
  • Breach notification

Encarta Labs Advantage

  • One Stop Corporate Training Solution Providers for over 6,000 various courses on a variety of subjects
  • All courses are delivered by Industry Veterans
  • Get jumpstarted from newbie to production ready in a matter of few days
  • Trained more than 50,000 Corporate executives across the Globe
  • All our trainings are conducted in workshop mode with more focus on hands-on sessions

View our other course offerings by visiting

Contact us for delivering this course as a public/open-house workshop/online training for a group of 10+ candidates.