FieldShield Certification

 

Next Steps
Overview Voracity CoSort FACT NextForm FieldShield CellShield EE DarkShield RowGen

When you have attained a level of expertise in the use of IRI FieldShield -- through either on-the-job experience or training material -- you may qualify for an official certification letter suitable for consulting engagements, job applications, and IT training centers. Following are various levels of certification you can obtain from IRI, and the USD cost of each certificate (which does not include training or validation).

FieldShield I

FieldShield II

FieldShield I

Prerequisites

  • None

Requirements

Install and license FieldShield software via Voracity on Windows or on Linux. Next, connect to an RDB source and define data classes with search matchers and masking rules in order to protect PII in a file or table or preferably, an RDB schema data masking project in IRI Workbench. Build your job scripts through those IRI Workbench wizards using a data class map along with functions like format-preserving encryption and decryption, reversible and non-reversible pseudonymization, randomization, or data generation.

Show the unmasked data in the source(s) and the masked data in the target(s) using consistent masking functions to preserve referential integrity. Also show log artifacts from a schema data class search (if performed as part of a schema data class masking job), and at least one runtime log for the masking job. Explain the application of FieldShield in data privacy law compliance (e.g., HIPAA, GDPR or PCI-DSS) and/or a data loss prevention (DLP) context. 

Cost

$75 USD

FieldShield II

Prerequisites

  • FieldShield I

Requirements

Demonstrate proficiency with manual job script modifications. Explain the application of FieldShield in big data, data governance, data integration, master data management, and industry-specific contexts. Learn and demonstrate at least 4 of these advanced topics:

  1. Incremental DB data masking using FieldShield rules in IRI Ripcurrent.
  2. Creating, linking and using a custom-developed masking function.
  3. Leveraging encryption key management via a supported external passphrase lookup method.
  4. The use of a FieldShield library function via its API in an application program.
  5. Creating a hash table and applying the rule for consistent, unique pseudonymization.
  6. Calling a field-level IRI DarkShield function into a FieldShield job.
  7. Using SQL queries or SortCL include/omit logic in a FieldShield job script to filter data.
  8. Adding substring manipulation, data cleansing, or another SortCL transformation function to a data masking job.
  9. Create new tables in IRI Workbench and populate them with a multi-table FieldShield masking wizard.
  10. Connect FieldShield to an RDB not yet documented here and write a blog article showing steps and screenshots to do it.
  11. Discover and create DDF metadata in, and build a FieldShield masking job for, a flat JSON, XML or Hadoop file, data in an Excel sheet, or an ASN.1-encoded CDR file.
  12. Using an import wizard for columns and rules to populate the data class and rule library and running the job.
  13. Exporting FieldShield search or masking log data and analyzing it in an external SIEM/SOC or log visualization tool like Splunk.


Cost

$100 USD

Share this page

Request More Information

Live Chat

* indicates a required field.
IRI does NOT share your information.