|
May 09, 2025
|
|
|
|
NET 708 - Database Concepts for Cyber Credits: 4 Lecture Hours: 2 Lab Hours: 4 Practicum Hours: 0 Work Experience: 0 Course Type: Voc/Tech This course explores databases topics from the perspective of a cyber-security discipline. The course introduces fundamentals of database management systems (DBMS), common practices to secure and audit DBMS, SQL characteristics and commands, and methods for using database-related information in incident response and digital forensics investigations. Competencies
- Describe major DBMS functions and their role in a database system.
- Generalize the fundamentals of relational, object-oriented, and distributed database systems including: data models, database architectures, and database manipulations
- Explain the fundamental terminology used in the relational data model
- Summarize the client/server model, and describe the key components used to implement Internet database environments;
- Utilize different methods to perform basic database administration tasks including database creation, manipulation, and control;
- Make use of GUI administration/management tools
- Make use of common manually-entered SQL syntax
- Formulate relational algebra operations from mathematical set theory (including union, intersection, difference, and Cartesian product) and the relational algebra operations developed specifically for relational databases (select, product, join, and division).
- Model queries in relational algebra.
- Construct queries in SQL to elicit information from a database.
- Incorporate fundamental security concepts and architectures that serve as building blocks to database security.
- Contrast with security components of operating systems, including system vulnerabilities and password policies, and file permissions.
- Explain principles of data encryption
- Summarize limitations associated with implementing encryption policies for relational databases.
- Summarize the auditing environment, process, objectives, classifications, and types of database auditing possible.
- Break down how triggers and stored procedures assist with the enforcement of database security and data integrity.
- Characterize the concepts of user account management and administration
- Relate confidentiality, integrity, and access concepts to users, authentication, tablespace (default & temporary), and quotas.
- Summarize security risks which administrators must be aware using Oracle and Microsoft’s SQL Server.
- Apply DBMS access controls.
- Choose the user permissions to address roles, profiles, policies, privileges, and rules.
- Choose the data permissions to address roles, profiles, policies, privileges, and rules.
- Generate investigative reports from DBMS artifacts.
- Deduct end-user activity based on DBMS journal and audit data.
- Break down B-Tree structured raw database data.
- Utilize manual and software-assisted methods to classify active and deleted data from relational databases in mobile apps.
- Determine DBMS-related vulnerabilities and mitigation strategies.
- Explain specific vulnerability causes and consequences.
- Make use of common vulnerability scanning tools.
- Examine privilege-escalation exploits.
- Evaluate targeted defenses for identified vulnerabilities.
Competencies Revised Date: 2019
Add to Portfolio (opens a new window)
|
|