Hero Banner
Database Security Training Course

Database Security Training Course

Learn how to develop effective assessment methodologies & secure what really matters most - your organisational database

Over 30 subjects covered, making it one of the most intense Database Security courses in the market

32 practical and hands-on lab sessions to strengthen your theoretical knowledge

Several downloadable PDFs and learning materials for reinforced learning

Knowledge that is immediately applicable in the job market to give you a massive career boost

 

For every organisation, the data and sensitive information it owns and stores, is one of its most vital assets. It is imperative to protect this information - its database - from unauthorised access and external threat actors.

This course teaches you all about the best practices involved in database security. It is a powerful way to upskill yourself as an Information Security professional and improve your employability as a Database Security manager.   

Benefits of the Database Security Training Course

  • A technical course for sharpening the knowledge of security teams, database administrators and security consultants. 
  • Learn all about best practices in database security management. 
  • Acquire knowledge that is immediately usable in the job market to give a massive boost to your career.
  • One of the most intensive courses in database security, covering 30+ subjects and offering 32 hands-on lab practice sessions. 

Database Security

 

Database Security Course Learning Objectives:

After the completion of this course, you will be able to: 

  • Articulate the fundamental concepts behind database systems. 

  • Offer a detailed explanation of the key components within a database deployment.

  • Properly understand how to integrate databases into business solutions.

  • Master the process of thorough database assessment, including tools and methodologies.

  • Understand and explain the techniques used by hackers to exploit database flaws and vulnerabilities.

  • Gain proficiency in practical assessment and attack vector considerations, through hands-on experience.

Feedback and Testimonials for our Courses

Kevin Hayes
The playbooks training course was a good 'part-2' to the CIPR and went into greater depth in a number of areas. The day was fun and Amar kept us moving along at a good pace.
Kevin Hayes
CISO, Cyber Risk Associates
Russ Smith

Enjoyed the course. Good mix of attendees and plenty of lively conversation. Amar steered us through it all admirably.

Russ Smith
CISO, EOL IT
Kim Rose

Overall the course was very good. I would strongly recommend this training to anyone who is involved in Cyber Security or has control of information assets.

Kim Rose
Information Governance Officer, Wye Valley NHS Trust
Philipp Scheiwiler

It was a great workshop with a lot of interesting people and a great learning experience.

Philipp Scheiwiler
System Engineer
Andrew Lock
This was a very helpful day and opportunity to speak with a number of operational incident responders to discuss what really works in practice and not just in theory. I gained a great deal from the day, particularly around the construction of bespoke playbooks and also a variety of useful resources to inform my learning. A really good day.
Andrew Lock
Information Security Consultant

Database Security Course Modules 

Module 1
  • Oracle Introduction. Installing Oracle Server.

  • Security Parameters.

  • Global Names. Audit Trail. OS Authent Prefix. 

  • Remote OS Authent. Remote OS Roles. Remote Listener. 

  • Sys Users. Lock and Expire Users. Create Profile. 

  • Access control.

  • Creating Role. Role with Password. Granted Role.

  • Cascading of Privileges. Audit Backup. Audit Trail.

  • Database Scanner.
Module 2
  • MSSQL. 

  • Ad Hoc Distributed Queries.Secure Guideline. CLR Enabled.

  • Cross DB Ownership. Remote Admin Connection. Scan For Startup Procs.

  • Trustworthy DB. Hide Instance Option. XP CMD Shell. 

  • MSSQL Parameters.

  • SQL Server Authentication Mode.

  • Password Policies. 

  • Role Backup. Audit Level. 

All trademarks, service marks, trade names, product names, service names and logos appearing on the site, or on printed or digital material are the property of their respective owners, including in Cyber Management Alliance Ltd. Any rights not expressly granted herein are reserved.

Footer Top Background Image
Simply fill in your details to request a FREE callback