Professional Course

Securing Databases | Database Security

Length
2 days
Length
2 days
This provider usually responds within 48 hours 👍

Course description

Securing Databases | Database Security

Securing Databases is an essential training course for DBAs and developers who need to produce secure database applications and manage secure databases. Data, databases, and related resources are at the heart of most IT infrastructures. These assets can have high value from a business, regulatory, and liability perspective, and must be protected accordingly. This course showcases demonstrations on how to repeatedly attack and then defend various assets associated with a fully functional database. This approach illustrates the mechanics of how to secure databases in the most practical of terms.

Security experts agree that the least effective approach to security is "penetrate and patch". It is far more effective to "bake" security into an application throughout its lifecycle. After spending significant time trying to defend a poorly designed (from a security perspective) database application, students will learn how to build secure their databases and applications, starting at project inception.

Do you work at this company and want to update this page?

Is there out-of-date information about your company or courses published here? Fill out this form to get in touch with us.

Who should attend?

This is an introduction to database security course for intermediate skilled team members. Attendees might include DBAs, system administrators, developers and other enterprise team members. Ideally, students should have approximately 6 months to a year of database working knowledge.

Training content

Please note that course topics, agenda and labs are subject to change, and may adjust during live delivery based on audience and interests and skill-level.

Session: Securing Databases Foundation

Lesson: Why Hunt for Security Defects?

· Security and Insecurity

· Dangerous Assumptions

· Attack Vectors

Lesson: Fingerprinting Databases

· Reconnaissance Goals

· Data Collection Techniques

· Fingerprinting the Environment

· Enumerating Web Applications

· Spidering, Dorks, and Other Tools

Lesson: Principles of Information Security

· Security Is a Lifecycle Issue

· Minimize Attack Surface Area

· Layers of Defense: Tenacious D

· Compartmentalize

· Consider All Application States

· Do NOT Trust the Untrusted

Session: Database Security Vulnerabilities

Lesson: Database Security Concerns

· Data at Rest and in Motion

· Privilege management

· Boundary Defenses

· Continuity of Service

· Trusted Recovery

Lesson: Vulnerabilities

· Unvalidated Input

· Broken Authentication

· Cross Site Scripting (XSS/CSRF)

· Injection Flaws

· Error Handling, Logging, and Information Leakage

· Insecure Storage

· Direct Object Access

· XML Vulnerabilities

· Web Services Vulnerabilities

· Ajax Vulnerabilities

Lesson: Cryptography Overview

· Strong Encryption

· Message digests

· Keys and key management

· Certificate management

· Encryption/Decryption

Lesson: Database Security

· Design and Configuration

· Identification and Authentication

· Computing Environment

· Database Auditing

· Boundary Defenses

· Continuity of Service

· Vulnerability and Incident Management

Session: Moving Forward

Lesson: What Next?

· Open Web Application Security Project (OWASP)

· OWASP Top Ten Overview

· Web Application Security Consortium

· CERT Secure Coding Standards

· Bug Hunting Mistakes to Avoid

· Tools and Resource

Session: Secure Development Lifecycle (SDL)

Lesson: SDL Process Overview

· Revisiting Attack/Defense Basics

· Types of Security Controls

· Attack Phases: Offensive Actions and Defensive Controls

· Secure Software Development Processes

· Shifting Left

· Actionable Items Moving Forward

Session: Taking Action Now

Lesson: Asset Analysis

· Targets: Data/Entity Assets

· Targets: Functional/Service Assets

· Classifying Based on Value and Risk Escalation

· Asset Inventory and Analysis

Lesson: Design Review

· Asset Inventory and Design

· Assets, Dataflows, and Trust Boundaries

· Risk Escalators in Designs

· Risk Mitigation Options

Lesson: Making Application Security Real

· Cost of Continually Reinventing

· Paralysis by Analysis

· Actional Application Security

· Additional Tools for the Toolbox

Costs

  • Price: $1,795.00
  • Discounted Price: $1,166.75

Why choose Trivera Technologies LLC?

Over 25 years of technology training expertise.

Robust portfolio of over 1,000 leading edge technology courses.

Guaranteed to run courses and flexible learning options.

Contact this provider

Contact course provider

Before we redirect you to this supplier's website, do you mind filling out this form so that we can stay in touch? You can unsubscribe at any time.
If you want us to recommend other suitable courses, please fill out all fields below and check the box beside "Please recommend similar options"
Country *

reCAPTCHA logo This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Trivera Technologies LLC
7862 West Irlo Bronson Highway
STE 626
Kissimmee FL 34747

Trivera Technologies

Trivera Technologies is a IT education services & courseware firm that offers a range of wide professional technical education services including: end to end IT training development and delivery, skills-based mentoring programs,new hire training and re-skilling services, courseware licensing and...

Read more and show all training delivered by this supplier

Ads