Course description
Securing Databases | Database Security
Securing Databases is an essential training course for DBAs and developers who need to produce secure database applications and manage secure databases. Data, databases, and related resources are at the heart of most IT infrastructures. These assets can have high value from a business, regulatory, and liability perspective, and must be protected accordingly. This course showcases demonstrations on how to repeatedly attack and then defend various assets associated with a fully functional database. This approach illustrates the mechanics of how to secure databases in the most practical of terms.
Security experts agree that the least effective approach to security is "penetrate and patch". It is far more effective to "bake" security into an application throughout its lifecycle. After spending significant time trying to defend a poorly designed (from a security perspective) database application, students will learn how to build secure their databases and applications, starting at project inception.
Do you work at this company and want to update this page?
Is there out-of-date information about your company or courses published here? Fill out this form to get in touch with us.
Who should attend?
This is an introduction to database security course for intermediate skilled team members. Attendees might include DBAs, system administrators, developers and other enterprise team members. Ideally, students should have approximately 6 months to a year of database working knowledge.
Training content
Please note that course topics, agenda and labs are subject to change, and may adjust during live delivery based on audience and interests and skill-level.
Session: Securing Databases Foundation
Lesson: Why Hunt for Security Defects?
· Security and Insecurity
· Dangerous Assumptions
· Attack Vectors
Lesson: Fingerprinting Databases
· Reconnaissance Goals
· Data Collection Techniques
· Fingerprinting the Environment
· Enumerating Web Applications
· Spidering, Dorks, and Other Tools
Lesson: Principles of Information Security
· Security Is a Lifecycle Issue
· Minimize Attack Surface Area
· Layers of Defense: Tenacious D
· Compartmentalize
· Consider All Application States
· Do NOT Trust the Untrusted
Session: Database Security Vulnerabilities
Lesson: Database Security Concerns
· Data at Rest and in Motion
· Privilege management
· Boundary Defenses
· Continuity of Service
· Trusted Recovery
Lesson: Vulnerabilities
· Unvalidated Input
· Broken Authentication
· Cross Site Scripting (XSS/CSRF)
· Injection Flaws
· Error Handling, Logging, and Information Leakage
· Insecure Storage
· Direct Object Access
· XML Vulnerabilities
· Web Services Vulnerabilities
· Ajax Vulnerabilities
Lesson: Cryptography Overview
· Strong Encryption
· Message digests
· Keys and key management
· Certificate management
· Encryption/Decryption
Lesson: Database Security
· Design and Configuration
· Identification and Authentication
· Computing Environment
· Database Auditing
· Boundary Defenses
· Continuity of Service
· Vulnerability and Incident Management
Session: Moving Forward
Lesson: What Next?
· Open Web Application Security Project (OWASP)
· OWASP Top Ten Overview
· Web Application Security Consortium
· CERT Secure Coding Standards
· Bug Hunting Mistakes to Avoid
· Tools and Resource
Session: Secure Development Lifecycle (SDL)
Lesson: SDL Process Overview
· Revisiting Attack/Defense Basics
· Types of Security Controls
· Attack Phases: Offensive Actions and Defensive Controls
· Secure Software Development Processes
· Shifting Left
· Actionable Items Moving Forward
Session: Taking Action Now
Lesson: Asset Analysis
· Targets: Data/Entity Assets
· Targets: Functional/Service Assets
· Classifying Based on Value and Risk Escalation
· Asset Inventory and Analysis
Lesson: Design Review
· Asset Inventory and Design
· Assets, Dataflows, and Trust Boundaries
· Risk Escalators in Designs
· Risk Mitigation Options
Lesson: Making Application Security Real
· Cost of Continually Reinventing
· Paralysis by Analysis
· Actional Application Security
· Additional Tools for the Toolbox
Costs
- Price: $1,795.00
- Discounted Price: $1,166.75
Quick stats about Trivera Technologies LLC?
Over 25 years of technology training expertise.
Robust portfolio of over 1,000 leading edge technology courses.
Guaranteed to run courses and flexible learning options.
Contact this provider
Trivera Technologies
Trivera Technologies is a IT education services & courseware firm that offers a range of wide professional technical education services including: end to end IT training development and delivery, skills-based mentoring programs,new hire training and re-skilling services, courseware licensing and...