Database Security, IT 428
About this Course:
Students will engage in an in-depth examination of topics in data security including security considerations in applications and systems development, encryption methods, cryptography law and security architecture and models.
IT 421 Database Concepts with Oracle or equivalent knowledge and experience are required for enrollment.
Who Should Attend:
Professionals seeking knowledge of the fundamentals of database protection and security.
Participants will produce several database security projects on multiple platforms, demonstrate knowledge of advanced techniques for intrusion detection and database auditing, become proficient in securing MS Access, SQL Server, and Oracle databases, and learn to use professional database security vocabulary. Participants will demonstrate knowledge of the fundamentals of database protection and security, including design, configuration, use, policies, deployment, enforcement, encryption, user and object surveillance, audit, and recovery, and will demonstrate advanced approaches and techniques for securing database applications implemented in MS Access, SQL Server, and Oracle.
Database Protection and Security; Information Systems Security; Operating System Security; Network Security; Application Security; Internet Security; Client/Server Security
Encryption; SSL; Database Users, Roles, Groups, Workgroups
Database Administration and Security
The Role of the Database Administrator; Developer Security; Database Hackers;
Database Good Programming Practices; Database Installation; Configuration, Upgrade and Distribution Security; Database Design Security; Data Integrity; Database System Objects Security; Secure Use (Querying) of Databases; Database Security Policies
Database Security Implementation; Database Security Deployment; Database Security Enforcement; Database User and Object Surveillance; Database Audit; Database Intrusion Detection; Database Backup and Recovery; Database Migration Security
Database Export/Import Security; Database Security Cases and Scenarios
Robert A. Hendry