Oct 17, 2019  
2017-2018 Catalog 
    
2017-2018 Catalog [ARCHIVED CATALOG]

[Add to Portfolio]

CIS 310 - Database Installation & Configuration Mang

5 Credits
This course provides a foundation in the installation and configuration of popular database systems such as MySQL, SQL Server, Oracle and Postgres. Students will explore the issues encountered on both Windows and Linux operating systems. They will test and document the ways in which database systems are breached from the installation, maintenance, and administrative aspects and how these breaches can be avoided, mitigated, or detected. Installations will take place on physical and virtual environments. When appropriate, cloud services will be used for testing.

Program Admission Required Yes Admitted Program BAS - CIS
Fees CF

Designed to Serve For students admitted to the BAS program in CyberSecurity and Forensics.
Active Date 2015-09-10

Grading System Decimal Grade
Class Limit 24
Contact Hours: Lecture 44 Lab 22 Worksite 0 Clinical 0 Other 0
Total Contact Hours 66
Degree Distributions:
Course Outline
I. Understand Database usage
a. Home Office / Small Business
b. Medium sized companies
c. Enterprise level

II. Database Vulnerabilities
a. Define the common vulnerabilities
b. Implement policies and protocols to mitigate same

III. Operating System Vulnerabilities
a. Windows
b. UNIX/Linux

IV. Planning interoperability of DB and Operating System
a. Explain how the operating system installation affects database security
b. Plan and implement installation of both

V. User Security
a. Plan and implement user accessibility levels
b. Explain and implement operating system vs. database system logins
c. Remote management
d. Remote logins

VI. Database information assurance
a. Confidential information
b. Personally identifiable information
c. Encryption
d. Password protection
e. Biometrics and other new technology

VII. Creating the database
a. Review database types
b. Review of tables, fields, field types etc.
c. Create a relational database
d. Create an object database

VIII. SQL
a. Basic SQL statements
b. Joins, Views, etc.
c. SQL injections

IX. Database security in the cloud

X. Understanding how regulations affect corporate database structure
a. HIPAA
b. FERPA
c. Other regulations

XI. Replication, backups and remote storage of data

XII. Incident response and disaster recovery


Student Learning Outcomes
Describe the business environments that use databases

Explain the common vulnerabilities of databases. Create policies to mitigate same

Explain operating system vulnerabilities

Describe how operating system vulnerabilities impact database installation and management

Describe and create the different user accessibility levels to databases

Apply information assurance policies to database log ins, personally identifiable information and confidential information

Explain and use SQL statements, logic and structures

Protect database and user interface environment from attacks such as SQL injections

Explain the various regulations such as HIPAA and FERPA that affect data storage. Create methodology to adhere to same

Create incident response and disaster recovery plans for the database environment



[Add to Portfolio]