The Database Security course will empower database administrators and developers in developing a strategy to plan database security, understand how the database relates to other technology solutions (Servers, Networks and Applications), and review policies and standards in line with Microsoft and Oracle best practices.
It also will provide the best approach, knowledge and tools to effectively plan and execute an Oracle/Microsoft SQL Database Security Assessment.
The course will address the key database areas to be evaluated to enable auditors give an informed opinion about the security of an information system.
Column Level Encryption
Database column level encryption enables encryption on individual table columns or an entire tablespace. When a user inserts data into an encrypted column, the data is automatically encrypted. It also helps protect data stored on media in the event that the storage media or data file gets stolen.
User Roles and Privileges
Apply varying limitations on user access and privilege to database, schemas, tables and other objects. Configure roles to facilitate the granting of multiple privileges or roles to users.
Database Auditing
Database auditing enforces strong internal controls to enable an organization meet its regulatory compliance requirements. Granular auditing of all SQL statements, SQL privileges, schema objects, and network activity is essential to database security.