Sep 18, 2019  
2017-2018 Catalog 
    
2017-2018 Catalog [ARCHIVED CATALOG]

[Add to Portfolio]

CIS 414 - Advanced Database Security

5 Credits
This course is the final one in the Database Security Certificate. Students continue with the industry standard databases (MS SQL Server, MySQL, Oracle, etc.) and will be exposed to the new / evolving ones coming on the market such as NO/ non-SQL (Not Only / non Sequential Query Language). They will use applications such as Hadoop, YARN, MapReduce, and related technologies for cloud based/distributed database systems. Students will employ encryption methodologies for databases, query analysis, load issues, data redaction and other topics. Hands-on projects and assignments will take place in physical and virtual environments. When appropriate, cloud services will be used for testing.

Pre-requisite(s) CIS 412
Program Admission Required Yes Admitted Program BAS - CIS
Fees CF

Designed to Serve For students admitted to the BAS program in CyberSecurity and Forensics.
Active Date 2015-10-27

Grading System Decimal Grade
Class Limit 24
Contact Hours: Lecture 44 Lab 22 Worksite 0 Clinical 0 Other 0
Total Contact Hours 66
Degree Distributions:
Course Outline
I. Review Database Audits

II. Use relevant programming and scripting languages

a. R

b. HIVE

c. PIG

d. Python

III. Laws and Policies that affect DB Security

a. PCI

b. HIPAA

c. FERPA

d. Others

IV. Distributed Database Security

a. Centralized Authentication

b. De-Centralized Authentication

c. Users and Groups

V. Installation of Hadoop

a. Stand alone

b. Clustered

VI. HDFS authentication

VII. Kerberos with Hadoop

VIII. Non-Kerberos Authentication

IX. Active Directory with Hadoop

X. MapReduce

a. Access Control Lists

XI. Encryption

a. At rest

b. In transit

XII. Cloudera

a. Kerberos

b. NameNode

c. DataNode

d. MapReduce

e. YARN

XIII. Apache Hadoop

a. Apache Knox

b. Apache Ranger

XIV. NO SQL and non-SQL Database security issues

a. Social media

b. Web scale databases

XV. Available Security Configurations

XVI. Hacking, Hardening and Defending Database Servers

a. MySQL

b. MS SQL Server

c. Oracle

d. Hadoop





Student Learning Outcomes
Demonstrate the use of a database audit

Install and harden a Hadoop stand alone and a Hadoop cluster environment

Explain, document and apply the laws / policies that affect databases

Explain the differences between centralized and de-centralized authentication. Be able to implement both on a database management system (DBMS).

Use Kerberos authentication on Hadoop

Employ Active Directory authentication on Hadoop

Install and use MapReduce with Hadoop

Employ Access Control Lists with Hadoop

Demonstrate effective use of encryption techniques for the popular DBMS’s for data at rest and in transit

Install and harden a small Cloudera Hadoop installation



[Add to Portfolio]