Database Security

(OAKCC-CIS1610.AA1)
Lessons
Lab
TestPrep
Get A Free Trial

Skills You’ll Get

1

Security Policies

  • Introduction
  • What Is a Policy?
  • Defining User Policies
  • Defining System Administration Policies
  • Defining Access Control
  • Development Policies
  • Standards, Guidelines, and Procedures
  • Disaster Recovery
  • Important Laws
  • Summary
2

Securing Resources

  • TCP/IP Security Vulnerabilities
  • Implementing Security
  • Resources and Services
  • Protecting TCP/IP Services
  • Simple Mail Transfer Protocol (SMTP)
  • Bring Your Own Device (BYOD)
  • Internet of Things (IoT)
  • Communication Systems
  • Physical Security
  • Testing Systems
  • Security Testing Software
  • Security Assessments
  • Security and Repetition
  • Lesson Summary
  • Optional Lab
3

Security Threats

  • Who Is the Threat?
  • Security Threats from Trusted Users
  • Anonymous Downloads and Indiscriminate Link-Clicking
  • Security Standards
  • Wireless Networking Modes
  • Wireless Application Protocol (WAP)
  • Site Surveys
  • Web Technologies
  • Greynet Applications
  • Sensitive Data and Data Classifications
  • Vulnerabilities with Data at Rest
  • Data and Drive Sanitizing
  • Lesson Summary
  • Optional Lab
4

Administer a Database

  • Understand Database Security Concepts
  • Understand Database Backups and Restore
  • Summary
5

Database Security

  • Introduction to Database Security Issues
  • Discretionary Access Control Based on Granting and Revoking Privileges
  • Mandatory Access Control and Role-Based Access Control for Multilevel Security
  • SQL Injection
  • Introduction to Statistical Database Security
  • Introduction to Flow Control
  • Encryption and Public Key Infrastructures
  • Privacy Issues and Preservation
  • Challenges to Maintaining Database Security
  • Oracle Label-Based Security
  • Summary
  • Review Questions
  • Exercises
  • Selected Bibliography
6

Transactions and Database Security

  • Introduction to Database Transactions and Security
  • Transactions
  • Concurrency Control
  • Transaction Support in SQL
  • Database Security
  • Lesson Summary
7

Applications, Data, and Cloud Security

  • It’s a Data-Driven World…At the Endpoint
  • Software as Appliances
  • Applications Lifecycles and Security
  • CIANA and Applications Software Requirements
  • Application Vulnerabilities
  • “Shadow IT:” The Dilemma of the User as Builder
  • Information Quality and Information Assurance
  • Protecting Data in Motion, in Use, and at Rest
  • Into the Clouds: Endpoint App and Data Security Considerations
  • Legal and Regulatory Issues
  • Countermeasures: Keeping Your Apps and Data Safe and Secure
  • Summary
  • Exam Essentials
8

Securing hosts and data

  • Module A: Malware
  • Module B: Securing data
  • Module C: Securing hosts
  • Summary
9

Understanding Authentication, Authorization, and Accounting

  • Starting Security with Authentication
  • Introducing Directory Services with Active Directory
  • Comparing Rights and Permissions
  • Understanding NTFS
  • Sharing Drives and Folders
  • Introducing the Registry
  • Using Encryption to Protect Data
  • Understanding IPsec
  • Introducing Smart Cards
  • Configuring Biometrics, Windows Hello, and Microsoft Passport
  • Using Auditing to Complete the Security Picture
  • Skill Summary
  • Business Case Scenarios
  • Workplace Ready
10

Protecting Security of Assets

  • Identifying and Classifying Information and Assets
  • Establishing Information and Asset Handling Requirements
  • Data Protection Methods
  • Understanding Data Roles
  • Using Security Baselines
  • Summary
  • Exam Essentials
  • Written Lab
11

Database Recovery Techniques

  • Recovery Concepts
  • NO-UNDO/REDO Recovery Based on Deferred Update
  • Recovery Techniques Based on Immediate Update
  • Shadow Paging
  • The ARIES Recovery Algorithm
  • Recovery in Multidatabase Systems
  • Database Backup and Recovery from Catastrophic Failures
  • Summary
  • Review Questions
  • Exercises
  • Selected Bibliography

1

Security Policies

  • Creating a Policy for Restricting Installations
2

Securing Resources

  • Scanning Systems in Ubuntu Linux
  • Securing the FTP Service
  • Securing an Apache Web Server
3

Security Threats

  • Analyzing Traffic Captured from Site Survey Software
  • Installing a Wardriving Application and Analyzing a Site Survey Capture
4

Administer a Database

  • Adding a New Login
  • Accessing the Database Roles
  • Creating a Backup
5

Database Security

  • Identifying database attacks
6

Securing hosts and data

  • Using an Anti-Spyware Tool
  • Managing NTFS Permissions
  • Configuring Lockout Policies
  • Using the chmod Command
  • Creating a Security Template
7

Understanding Authentication, Authorization, and Accounting

  • Creating OUs in a Domain
  • Using a Hashing Algorithm
  • Moving Objects into an OU
  • Creating a GPO
  • Changing NTFS Permissions on a Folder
  • Copying Files
  • Moving Files
  • Understanding Permission Inheritance
  • Using Groups to Assign Permissions
  • Sharing a Folder
  • Encrypting a Folder with the EFS
  • Encrypting the Drive Using BitLocker
  • Performing Symmetric Encryption
  • Performing Asymmetric Encryption
  • Creating a VPN Connection
  • Configuring an IPsec Policy
  • Changing the Audit Policy
  • Modifying Kerberos Security Settings
8

Protecting Security of Assets

  • Understanding Data Loss Prevention System
9

Database Recovery Techniques

  • Creating a backup

Related Courses

All Courses
scroll to top