|
Jul 01, 2025
|
|
|
|
CIS 414 - Advanced Database Security5 Credits This course is the final one in the Database Security Certificate. Students continue with the industry standard databases (MS SQL Server, MySQL, Oracle, etc.) and will be exposed to the new / evolving ones coming on the market such as NO/ non-SQL (Not Only / non Sequential Query Language). Students will use Hadoop. Students will employ encryption methodologies for databases, query analysis, load issues, data redaction and other topics. Hands-on projects and assignments will take place in physical, virtual and cloud environments.
Pre-requisite(s) CIS 412 min. 2.0 Program Admission Required Yes Admitted Program BAS - CIS FeesCF
Quarters Typically Offered Winter Evening Spring Evening
Designed to Serve For students admitted to the BAS program in CyberSecurity and Forensics. Active Date 20200401T13:21:24
Grading Basis Decimal Grade Class Limit 24 Contact Hours: Lecture 44 Lab 22 Total Contact Hours 66 Degree Distributions: ProfTech Course Yes Restricted Elective Yes Course Outline
- Review Database Audits
- Use relevant programming and scripting languages
- Laws and Policies that affect DB Security
- Distributed Database Security
- Centralized Authentication
- De-Centralized Authentication
- Users and Groups
- Installation of Hadoop
- Installation of SQL Server, MySQL and Oracle
- in vSphere
- in Public Cloud
- Encryption
- NO SQL and non-SQL Database security issues
- Social media
- Web scale databases
- Available Security Configurations
- Hacking, Hardening and Defending Database Servers
- MySQL
- MS SQL Server
- Oracle
- Hadoop
Student Learning Outcomes Demonstrate the use of a database audit to make adjustments in the database or DBMS.
Install a Hadoop stand alone and a small Hadoop cluster environment.
Install SQL Server, MySQL, and other DBMSs in a variety of environments including the a public cloud.
Explain the laws / policies that affect database installations and management.
Demonstrate the differences between centralized and de-centralized authentication on a database management system (DBMS).
Demonstrate effective use of encryption techniques for the popular DBMS’s for data at rest and in transit.
Add to Portfolio (opens a new window)
|
|