Show as: Mobile

Securing Databases | Database Security

Trivera Technologies LLC
Training overview
Professional Course
2 days
From 1,895 USD
Start dates
1,895 USD

1,895 USD

1,895 USD

1,895 USD

Course description

Securing Databases | Database Security

Securing Databases is an essential training course for DBAs and developers who need to produce secure database applications and manage secure databases. Data, databases, and related resources are at the heart of most IT infrastructures. These assets can have high value from a business, regulatory, and liability perspective, and must be protected accordingly. This course showcases demonstrations on how to repeatedly attack and then defend various assets associated with a fully functional database. This approach illustrates the mechanics of how to secure databases in the most practical of terms.

Security experts agree that the least effective approach to security is "penetrate and patch". It is far more effective to "bake" security into an application throughout its lifecycle. After spending significant time trying to defend a poorly designed (from a security perspective) database application, students will learn how to build secure their databases and applications, starting at project inception.

Who should attend?

This is an introduction to database security course for intermediate skilled team members. Attendees might include DBAs, system administrators, developers and other enterprise team members. Ideally, students should have approximately 6 months to a year of database working knowledge.

Training content

Please note that course topics, agenda and labs are subject to change, and may adjust during live delivery based on audience and interests and skill-level.

Session: Securing Databases Foundation

Lesson: Why Hunt for Security Defects?

· Security and Insecurity

· Dangerous Assumptions

· Attack Vectors

Lesson: Fingerprinting Databases

· Reconnaissance Goals

· Data Collection Techniques

· Fingerprinting the Environment

· Enumerating Web Applications

· Spidering, Dorks, and Other Tools

Lesson: Principles of Information Security

· Security Is a Lifecycle Issue

· Minimize Attack Surface Area

· Layers of Defense: Tenacious D

· Compartmentalize

· Consider All Application States

· Do NOT Trust the Untrusted

Session: Database Security Vulnerabilities

Lesson: Database Security Concerns

· Data at Rest and in Motion

· Privilege management

· Boundary Defenses

· Continuity of Service

· Trusted Recovery

Lesson: Vulnerabilities

· Unvalidated Input

· Broken Authentication

· Cross Site Scripting (XSS/CSRF)

· Injection Flaws

· Error Handling, Logging, and Information Leakage

· Insecure Storage

· Direct Object Access

· XML Vulnerabilities

· Web Services Vulnerabilities

· Ajax Vulnerabilities

Lesson: Cryptography Overview

· Strong Encryption

· Message digests

· Keys and key management

· Certificate management

· Encryption/Decryption

Lesson: Database Security

· Design and Configuration

· Identification and Authentication

· Computing Environment

· Database Auditing

· Boundary Defenses

· Continuity of Service

· Vulnerability and Incident Management

Session: Moving Forward

Lesson: What Next?

· Open Web Application Security Project (OWASP)

· OWASP Top Ten Overview

· Web Application Security Consortium

· CERT Secure Coding Standards

· Bug Hunting Mistakes to Avoid

· Tools and Resource

Session: Secure Development Lifecycle (SDL)

Lesson: SDL Process Overview

· Revisiting Attack/Defense Basics

· Types of Security Controls

· Attack Phases: Offensive Actions and Defensive Controls

· Secure Software Development Processes

· Shifting Left

· Actionable Items Moving Forward

Session: Taking Action Now

Lesson: Asset Analysis

· Targets: Data/Entity Assets

· Targets: Functional/Service Assets

· Classifying Based on Value and Risk Escalation

· Asset Inventory and Analysis

Lesson: Design Review

· Asset Inventory and Design

· Assets, Dataflows, and Trust Boundaries

· Risk Escalators in Designs

· Risk Mitigation Options

Lesson: Making Application Security Real

· Cost of Continually Reinventing

· Paralysis by Analysis

· Actional Application Security

· Additional Tools for the Toolbox


  • Price: $1,795.00
  • Discounted Price: $1,166.75

Why choose Trivera Technologies LLC?

Over 25 years of technology training expertise.

Robust portfolio of over 1,000 leading edge technology courses.

Guaranteed to run courses and flexible learning options.

About Trivera Technologies LLC

Trivera Technologies

Trivera Technologies is a IT education services & courseware firm that offers a range of wide professional technical education services including: end to end IT training development and delivery, skills-based mentoring programs,new hire training and re-skilling services, courseware licensing and...

Read more and show all training delivered by this supplier

Contact this provider

Fill out your details to find out more about Securing Databases | Database Security.

  Contact the provider

  Get more information

  Register your interest

Contact info

Trivera Technologies LLC

7862 West Irlo Bronson Highway
STE 626
Kissimmee FL 34747

 Show phone number

Contact provider

Have a question about this course? Fill out this form and the provider will get in touch with you shortly

Training reviews

No reviews available

Need help with your search? offers a free consultancy service to help compare training for you and your team

Request a free quote

Request a free training quote

You may also like...