Database Security_v1 1.pdf - MIEL eSecurity Pvt. Ltd.
COURSE OBJECTIVE COURSE OVERVIEW To understand various database vulnerabilities. To learn to mitigate database attacks and accidents, using: 1. Secure practices for schema design 2. Appropriate settings of database parameters 3. Best practices for secure database coding 4. Robust access control for system and object resources 5. Techniques for minimizing the attack surface To understand methods for database intrusion detection Devise a checklist for database security To understand relevance of database security for various global compliances/standards For all IT enabled organizations their business data is the most critical and valuable asset, e.g. Core Banking, Stocks Trading, Insurance, Ticketing, HR, Examinations, ERP, CRM, SCM etc. Any unintended usage or modification of data directly affects the revenues, profitability, company image, public trust and confidence level of an enterprise. During most of the development lifecycle, database is predominantly tested for the business functionality and efficiency. The security aspects of the design are missed out. Database Security is one of the major areas in Information Security. This course focuses upon security threats and vulnerabilities related to databases. This comprehensive database security course provides information that Database Administrators (DBA) and security professionals need to develop, deploy and maintain a secure database solution. The concepts mentioned in this course are vendor neutral to a great extent. However, some specialized tools relate directly to Oracle and SQL Server 2005 that are the most commonly used RDBMS solutions. This course covers security aspects of database technologies and examines exploitation of database vulnerabilities in detail. The course also aims to expose pitfalls of insecure database design, their means of identification and the methods of exploiting vulnerabilities. The course is enriched with an optimal blend of theory and multiple practical demonstrations.