Data Analyst Training Icon

Data Life Cycle Management

3 Days Classroom Session   |  
4 Days Live Online
Classroom Registration
Group Rate:
(per registrant, 2 or more)
GSA Individual:
Live Online Registration
Live Online:
Private Onsite Package

This course can be tailored to your needs for private, onsite delivery at your location.

Request a Private Onsite Price Quote

Professional Credits


ASPE is an IIBA Endorsed Education Provider of business analysis training. Select Project Delivery courses offer IIBA continuing development units (CDU) in accordance with IIBA standards.


Select courses offer Leadership (PDU-L), Strategic (PDU-S) and Technical PMI professional development units that vary according to certification. Technical PDUs are available in the following types: ACP, PBA, PfMP, PMP/PgMP, RMP, and SP.

This course offers:
    14.00 PMP/PgMP Technical PDUs
    1.00 PfMP Technical PDUs
    7.00 PMI-RMP Technical PDUs
    4.00 PMI-SP Technical PDUs
    7.00 PMI Strategic PDUs


Managing business information through its lifecycle from requirements through retirement is the data lifecycle management process. In order use data to support business goals with minimal risk, managing information properly over its lifetime equips organizations with the right information. The vast amounts of data, and growing, that businesses must understand underpins the emergent notion that organizations must put appropriate processes into place for effective data lifecycle management.

In this three day course, you will dig through fundamental data management processes, best practices and methods that will enable you to develop a data management plan for your organization. Not only will you be able to develop an effective data management plan, you will go back to work with the practices and methods to effectively create, organize, manage, preserve and share data. By having the right skills, processes and practices you will be able to address the organization challenges of reducing risk, costs and increasing organizational responsiveness. 

Upcoming Dates and Locations
All Live Online times are listed in Eastern Time Guaranteed To Run

There aren’t any public sessions currently scheduled for this course, but if you fill out the form below, we can tell you about how we can bring this course to you!

Course Outline

Part 1: Introduction to Lifecycle Management

  1. Recognizing the Vital Stages in the Start to End Lifecycle of Data and Storage Architectures
    • Understand why it is important to manage data
    • Understand and explore the stages in the data lifecycle
      • Plan, Collect, Assure, Describe, Preserve, Discover, Integrate,  Analyze
    • Understand the key storage architectures
    • Distinguish the pros/cons of using different architectures
    • Exercise: Practice identifying elements of data lifecycle and their function
    • Exercise: Practice identifying storage architectures and their appropriate use
  2. Importance of Architecture, Analysis, and Design
    • Differentiate between core architectures
    • Understand the importance of analysis and how to use it to guide data management decisions
    • Understand strategies for translating analysis and design
    • Exercise: Identifying architectures
    • Exercise: Practice analysis process and design process
  3. Recognize Data as a Key Business Asset
    • Identify data as a business asset
    • Learn to prioritize data assets
    • Exercise: Identifying key business data
    • Exercise: Prioritizing data
  4. Stewardship and Governance of Data Through the Lifecycle
    • Core Data Stewardship Concepts
    • Data quality, integrity, accessibility and security
    • Core elements of a data governance plan
    • Data protection, risk assessment, compliance requirements, stakeholder management and access management
    • Exercise: Identifying  data governance principles
    • Exercise: Identifying data stewardship principles

Part 2: Database Design

  1. Designing Provisioning Workflows
    • Explore principles of Agile Provisioning
    • Inspect provisioning workflows
    • Provisioning best practices
  2. Data Cleansing and Transformation
    • Principles of data cleansing and data transformation
    • Data cleansing best practices
    • Data transformation planning
    • Exercise: Design provisioning workflows
    • Exercise: Develop data cleansing and transformation plans
  3. Designing Patching Workflows
    • Core elements of developing a patch plan
    • Implications of a poorly designed patch workflow
    • Patch management best practices
  4. Ensuring Quality and Integrity of Data
    • Fundamentals of quality and integrity in data
    • Data quality best practices
    • Data integrity best practices
    • Exercise: Design patching workflows
    • Exercise: Practice data quality and integrity planning
  5. Data Security and Management
    • Best practices in data security management
    • Approaches to privacy management
    • Data security and privacy management planning
  6. Provisioning New Databases from Reference Systems
    • Analyzing reference systems for requirements
    • Considerations when developing a provisioning plan from reference systems
    • Exercise: Analyze security and privacy management plans
    • Exercise: Practice provisioning from reference systems

Part 3: Configuration and Change Management

  1. Defining a Gold Standard and Baseline Configuration
    • Explore data standard best practices
    • Examine considerations for a baseline data configuration
    • Learn core aspects of a solid data development methodology
  2. Change Activity Planning
    • Plan Change Activity, including starting and end dates; creating assigning and tracking task status
    • Learn to manage large numbers of task and targets
    • Learn to monitor your plans for potential delays and quickly evaluate overall plan status
    • Exercise: Best Practices in standards and baseline configurations
    • Exercise: Change Activity Planning
  3. Patch Management
    • Learn the core elements of a patch management process
      • Detect
      • Assess
      • Acquire
      • Test
      • Deploy
      • Maintain
    • Monitoring vulnerabilities, remediation’s and threats
  4. Pre-Deployment Analysis
    • Learn core elements of a pre-deployment plan
    • Best practices in pre-deployment analysis
    • Exercise: Practice analyzing patch management plans
    • Exercise: Practice analyzing pre-deployment analysis
  5. Pre-Deployment Analysis
    • Core elements of a pre-deployment plan
    • Best practices in a pre-deployment plan
    • Exercise: Practice analyzing patch management plans
    • Exercise: Practice analyzing pre-deployment plans
  6. Managing the Rollout
    • Foundations of a successful roll-out plan
    • Potential pitfalls that affect roll-outs
    • Explore steps in a standard roll-out plan
  7. Reporting Status and Conflict Resolution
    • Strategies for status reporting
    • Core techniques in conflict resolution
    • Best practices with regards to conflict resolution
    • Explore components of a conflict resolution plan
    • Exercise: Practice analyzing roll-out plans, status reporting plans, and conflict resolution plans

Part 4: Compliance Management

  1. Compliance Standards
    • Core elements of compliance standards
    • Work towards a compliance framework
    • Examine compliance standards rules
    • Exercise: Practice analyzing compliance standards
    • Exercise: Practice analyzing the elements of a compliance framework
    • Exercise: Practice developing conceptual compliance standards rules
  2. Security and Configuration Reporting Best Practices
    • Best practices in security reporting
    • Best practices in configuration reporting
    • Exercise: Practice analyzing security reporting methods
    • Exercise: Practice analyzing configuration reporting methods
  3. Detecting Unauthorized Changes
    • Principles of data auditing and DAM (Database Activity Monitoring)
    • Explore common techniques for data auditing within databases
    • Examine database logs for unauthorized changes
    • Developing policies to manage unauthorized access
    • Exercise: Practice applying database activity monitoring principles
    • Exercise: Practice examining database logs
    • Exercise: Practice developing access policies

Part 5: Disaster Protection

  1. Building for Availability
    • System design considerations for availability
    • Overview of high available methodologies
    • Explore available design and management best practices
    • Exercise: Practice analyzing system design considerations
    • Exercise: Practice analyzing high availability methodologies
    • Exercise: Practicing analyzing availability design and management best practices
  2. Automating a Complete Site Failover
    • Core principles in automating a complete site failover
    • Site failover automation methodologies
    • Best practices in automation of complete site failover
    • Exercise: Practice analyzing core principles of automating a complete site failover
    • Exercise: Practice distinguishing between site failover automation methodologies
    • Exercise: Practice identifying best practices
  3. Minimizing Risk
    • Core concepts in data risk management
    • Fundamental elements of a data risk management plan
    • Data risk management best practices
    • Exercise: Practice identifying core concepts in data risk management
    • Exercise: Practice developing elements of a data risk management plan
    • Exercise: Practice identifying best practices
Who should attend
  • Data Managers
  • Data Management Analysts
  • Database Administrators
  • Data Architects
  • Data Scientist
  • Business Analysts
  • Business managers and leaders
  • PMO Managers
  • CIO, CTO, Directors of IT
  • Anyone interested in data management