Undergraduate Admission
    Graduate Admission

    Database Security, IT 428

    About this Course:
    Students will engage in an in-depth examination of topics in data security including security considerations in applications and systems development, encryption methods, cryptography law and security architecture and models.

    Currently Scheduled

    IT 421 Database Concepts with Oracle or equivalent knowledge and experience are required for enrollment.

    Who Should Attend:
    Professionals seeking knowledge of the fundamentals of database protection and security.

    Expected Outcomes:
    Participants will produce several database security projects on multiple platforms, demonstrate knowledge of advanced techniques for intrusion detection and database auditing, become proficient in securing MS Access, SQL Server, and Oracle databases, and learn to use professional database security vocabulary. Participants will demonstrate knowledge of the fundamentals of database protection and security, including design, configuration, use, policies, deployment, enforcement, encryption, user and object surveillance, audit, and recovery, and will demonstrate advanced approaches and techniques for securing database applications implemented in MS Access, SQL Server, and Oracle.

    Course Outline:


    Database Protection and Security; Information Systems Security; Operating System Security; Network Security; Application Security; Internet Security; Client/Server Security

    System Administration

    Encryption; SSL; Database Users, Roles, Groups, Workgroups

    Database Administration and Security

    The Role of the Database Administrator; Developer Security; Database Hackers;

    Database Good Programming Practices; Database Installation; Configuration, Upgrade and Distribution Security; Database Design Security; Data Integrity; Database System Objects Security; Secure Use (Querying) of Databases; Database Security Policies

    Database Security Implementation; Database Security Deployment; Database Security Enforcement; Database User and Object Surveillance; Database Audit; Database Intrusion Detection; Database Backup and Recovery; Database Migration Security

    Database Export/Import Security; Database Security Cases and Scenarios


    Robert A. Hendry