Skill Up Card - Course Bundles

Pricing is per delegate, giving you huge savings over the cost of individual courses.

  • UK = £2,000 + VAT per Skill Up Card
  • Ireland = €2,400 per Skill Up Card
skill up card logo - Nexus Human

Securing Databases | Database Security (TT8700)

4.6 out of 5 rating Last updated 14/11/2024   English

Jump to outline

Global Schedule

GTR = Guaranteed to Run

05 Feb 25 Book
15:00 - 23:00 Live Online 1,723
16 Apr 25 Book
15:00 - 23:00 Live Online 1,723

18 Jun 25 Book
15:00 - 23:00 Live Online 1,723
20 Aug 25 Book
15:00 - 23:00 Live Online 1,723
22 Oct 25 Book
15:00 - 23:00 Live Online 1,723
03 Dec 25 Book
15:00 - 23:00 Live Online 1,723
Duration

2 Days

12 CPD hours

Overview

Throughout the course, you will learn to:
- Understand the consequences for not properly handling untrusted data such as denial of service, cross-site scripting, and injections
- Establish the first axiom in security analysis of ALL web applications for this course and beyond
- Establish the first axiom in addressing ALL security concerns for this course and beyond
- Test databases with various attack techniques to determine the existence of and effectiveness of layered defenses
- Prevent and defend the many potential vulnerabilities associated with untrusted data
- Understand the concepts and terminology behind supporting, designing, and deploying secure databases
- Appreciate the magnitude of the problems associated with data security and the potential risks associated with those problems
- Understand the currently accepted best practices for supporting the many security needs of databases.
- Understand the vulnerabilities associated with authentication and authorization within the context of databases and database applications
- Detect, attack, and implement defenses for authentication and authorization functionality
- Understand the dangers and mechanisms behind Injection attacks
- Understand the concepts and terminology behind defensive, secure database configuration and operation
- Understand the use of Threat Modeling as a tool in identifying software vulnerabilities based on realistic threats against meaningful assets
- Perform both static reviews and dynamic database testing to uncover vulnerabilities
- Design and develop strong, robust authentication and authorization implementations
- Understand the fundamentals of Digital Signatures as well as how it can be used as part of the defensive infrastructure for data
- Understand the fundamentals of Encryption as well as how it can be used as part of the defensive infrastructure for data
- Identify resources to use for ongoing threat intelligence
- Plan next steps after completion of this training

Description

From ransomware and constant data breaches to state-sponsored attacks, we are under constant and increasing pressure.
Retailers, financial institutions, government agencies, high-tech companies, and many others are paying the price for poor application security - financial losses and eroding trust. The developer community must take ownership of these problems and change our perspective of defensive measures and how we design, development, and maintain software applications.
Securing Databases is an essential training course for DBAs and developers who need to produce secure database applications and manage secure databases. Data, databases, and related resources are at the heart of most IT infrastructures. These assets can have high value from a business, regulatory, and liability perspective, and must be protected accordingly. This course showcases demonstrations on how to repeatedly attack and then defend various assets associated with a fully functional database. This approach illustrates the mechanics of how to secure databases in the most practical of terms.
This course introduces the most common security vulnerabilities faced by databases today. Throughout the course, you'll examine each vulnerability from a database perspective through a process of describing the threat and attack mechanisms, recognizing associated vulnerabilities, and then designing, implementing, and testing effective defenses. Multiple practical demonstrations reinforce these concepts with real vulnerabilities and attacks. You'll also learn how to design and implement the layered defenses needed to defend your own databases.
You'll exit this course with the skills required to recognize actual and potential database vulnerabilities, implement defenses for those vulnerabilities, and test those defenses for sufficiency.

Prerequisites

This is an introduction to database security course for intermediate skilled team members. Attendees might include DBAs, system
administrators, developers and other enterprise team members. Ideally, students should have approximately 6 months to a year of
database working knowledge.

Securing Databases Foundation
  • Why Hunt for Security Defects
  • Fingerprinting Databases
  • Principles of Information Security
Database Security Vulnerabilities
  • Database Security Concerns
  • Vulnerabilities
  • Cryptography Overview
  • Database Security
Database Security
  • What Next
Secure Development Lifecycle (SDL)
  • SDL Process Overview
Taking Action Now
  • Asset Analysis
  • Design Review
  • Making Application Security Real
Additional course details:

Nexus Humans Securing Databases | Database Security (TT8700) training program is a workshop that presents an invigorating mix of sessions, lessons, and masterclasses meticulously crafted to propel your learning expedition forward.

This immersive bootcamp-style experience boasts interactive lectures, hands-on labs, and collaborative hackathons, all strategically designed to fortify fundamental concepts.

Guided by seasoned coaches, each session offers priceless insights and practical skills crucial for honing your expertise. Whether you're stepping into the realm of professional skills or a seasoned professional, this comprehensive course ensures you're equipped with the knowledge and prowess necessary for success.

While we feel this is the best course for the ITS Data Analytics course and one of our Top 10 we encourage you to read the course outline to make sure it is the right content for you.

Additionally, private sessions, closed classes or dedicated events are available both live online and at our training centres in Dublin and London, as well as at your offices anywhere in the UK, Ireland or across EMEA.

FAQ for the Securing Databases | Database Security (TT8700) Course

Available Delivery Options for the Securing Databases | Database Security (TT8700) training.
  • Live Instructor Led Classroom Online (Live Online)
  • Traditional Instructor Led Classroom (TILT/ILT)
  • Delivery at your offices in London or anywhere in the UK
  • Private dedicated course as works for your staff.
How many CPD hours does the Securing Databases | Database Security (TT8700) training provide?

The 2 day. Securing Databases | Database Security (TT8700) training course give you up to 12 CPD hours/structured learning hours. If you need a letter or certificate in a particular format for your association, organisation or professional body please just ask.

Which exam does the Securing Databases | Database Security (TT8700) training course prepare you for?

The Securing Databases | Database Security (TT8700) prepares you for the Yes official exam. You can take this exam at any exam center across UK including, England, Scotland, Cymru (Wales) or Northern Ireland or live online where ever you are. Exams vary in duration and if required you can request with the provider for any accommodations appropriate for you.

What is the correct audience for the Securing Databases | Database Security (TT8700) training?

This is an introduction to database security course for intermediate skilled team members. Attendees might include DBAs, system
administrators, developers and other enterprise team members. Ideally, students should have approximately 6 months to a year of
database working knowledge.

Do you provide training for the Securing Databases | Database Security (TT8700).

Yes we provide corporate training, dedicated training and closed classes for the Securing Databases | Database Security (TT8700). This can take place anywhere in UK including, England, Scotland, Cymru (Wales) or Northern Ireland or live online allowing you to have your teams from across UK or further afield to attend a single training event saving travel and delivery expenses.

What is the duration of the Securing Databases | Database Security (TT8700) program.

The Securing Databases | Database Security (TT8700) training takes place over 2 day(s), with each day lasting approximately 8 hours including small and lunch breaks to ensure that the delegates get the most out of the day.

What other terms do people search for when looking for this course?

Popular related searched include Databases; Security.

Why are Nexus Human the best provider for the Securing Databases | Database Security (TT8700)?
Nexus Human are recognised as one of the best training companies as they and their trainers have won and hold many awards and titles including having previously won the Small Firms Best Trainer award, national training partner of the year for UK on multiple occasions, having trainers in the global top 30 instructor awards in 2012, 2019 and 2021. Nexus Human has also been nominated for the Tech Excellence awards multiple times. Learning Performance institute (LPI) external training provider sponsor 2024.
Is there a discount code for the Securing Databases | Database Security (TT8700) training.

Yes, the discount code PENPAL5 is currently available for the Securing Databases | Database Security (TT8700) training. Other discount codes may also be available but only one discount code or special offer can be used for each booking. This discount code is available for companies and individuals.

Jump to dates

Training Insurance Included!

When you organise training, we understand that there is a risk that some people may fall ill, become unavailable. To mitigate the risk we include training insurance for each delegate enrolled on our public schedule, they are welcome to sit on the same Public class within 6 months at no charge, if the case arises.

What people say about us


Top