Database Security for Cyber Professionals
3.9 (8 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
471 students enrolled
Wishlisted Wishlist

Please confirm that you want to add Database Security for Cyber Professionals to your Wishlist.

Add to Wishlist

Database Security for Cyber Professionals

Learn to Hack and Protect Relational Databases
3.9 (8 ratings)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
471 students enrolled
Created by Chad Russell
Last updated 2/2017
English
Current price: $10 Original price: $20 Discount: 50% off
5 hours left at this price!
30-Day Money-Back Guarantee
Includes:
  • 3.5 hours on-demand video
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
What Will I Learn?
  • Protect database such as MySQL, Oracle and PostgreSQL from attackers.
  • Hack and pen test databases such as MySQL, Oracle and PostgreSQL.
  • Design a defense in depth architecture for database environments.
View Curriculum
Requirements
  • Students should have a basic understanding of database technology and networking.
  • Have a working internet connection.
Description

Course Overview

In this course you will learn how to secure open source and commercial database platforms against modern threats and attack vectors.  This course includes a mix of conceptual lectures and detailed screencasts outlining all the steps involved with conducting test attacks and subsequently securing your database platforms. 

Table of Contents

Lessons 1 – 4 -  Database Security Core - Here we will cover modern database security architectures, attack vectors and security threats.   You will learn how to design database defense in depth architectures utilizing a combination of preventive, corrective and detective controls.

Lesson 5 – Platform Hardening – Minimizing the attack surface area of operating systems, databases and applications is a key tenet of operational security.   Let’s talk about techniques for OS/DB and App hardening.  

Lesson 6 – MySQL Security Lab Build out – In this Lesson you will learn how to build your own MySQL Security Lab environment using Oracle VirtualBox. 

Lesson 7 – My SQL Architecture and Exploits – After building out your MySQL Security Lab I will explain the MySQL Security Architecture and show you how to attack  MySQL Database installations.  

Lesson 8 – Locking Down MySQL – You will learn how to effectively secure MySQL Database installations using industry best practices and techniques.    

Lesson 9 – Oracle Exploitation and Security Best Practices – You will learn how to build an Oracle Database Security Lab environment as well as how to exploit and secure Oracle Databases from modern threats and attack vectors.   

Lesson 10 – PostgreSQL Architecture, Exploits and Hardening – You will learn PostgreSQL’s Security architecture and how to exploit and secure PostgreSQL Databases from modern threats and attack vectors.  

Lesson 11 – Storage Encryption - Storage Security has more moving parts than ever, especially considering the convergence of IP and Storage Networking technologies.   In this section we will talk about how to secure data at rest on Storage Area Networks, NAS and local systems.  

Lesson 12 – Key Management - Any encryption is only as good as the protection of its keys.   In this section you will learn about encryption key management procedures and best practices. 

Lesson 13 -  Locking Down Big Data - Big Data is a broad term for data sets so large or complex that traditional data processing applications are inadequate. Big data is defined by significant data volume, variety and volume.   With the aggregation of these large data sets comes new security challenges.   In this lesson you will learn how to secure Big Data.  Linux Live Response - In this lesson you will learn how to statically compile forensic response tools in Linux to be used to conduct a live response of another Linux system.


Who is the target audience?
  • Anyone interested in learning how to hack and protect database environments.
  • Students who want to know how hackers breach commercial and open source databases.
Students Who Viewed This Course Also Viewed
Curriculum For This Course
15 Lectures
03:34:31
+
Database Security Course Introduction
1 Lecture 04:01
+
Database Security for Cyber Professionals
14 Lectures 03:30:30
Database Security Core - Part 1
05:00

Database Security Core - Part 2
05:02

Database Security Core - Part 3
05:03

Database Security Core - Part 4
07:50


MySQL Security Lab Buildout
08:01

MySQL Architecture and Exploits
17:12

Locking Down MySQL - Part 1
17:57

Locking Down MySQL - Part 2
17:51

Oracle Exploitation and Security Best Practices
43:49

PostgreSQL Architecture, Exploits and Hardening
20:09

Storage Encryption
19:15

Key Management
16:59

Locking Down Big Data
18:02
About the Instructor
Chad Russell
3.6 Average rating
1,038 Reviews
16,788 Students
24 Courses
Join the Cyber Security Industry in 2016!

Instructor Bio – Chad Russell

Join the Cyber Security Industry in 2017!

If you are interested in starting a career in the Cyber Security Industry 2016 is the time! 

Learning the fundamentals of Cyber Security provides you with  a powerful and very useful set of skills.  Study Penetration Testing and Ethical Hacking and learn to think like a hacker so you can better defend your networks and data.   

Jobs in Cyber Security are plentiful, and getting Security+ Certified will give you a strong background to more easily pick up and tackle more advanced exams such as the Certified Ethical Hacker and CISSP certifications.  

Get certified and land an entry level Cyber Security position paying upwards of six figures!  There are currently over a million Cyber Security job openings global and demand is greatly outpacing supply which means more opportunity, job security and higher pay for you!   

But, don't take my word for it...please take a look at the FREE previews (they are available in all my courses) and see for yourself.  This year I have partnered with webofsecurity.com, a premier provider of ‘All Things Information Security’ to bring you a fantastic suite of Cyber Security certification training to help you get into the hottest industry in IT. 

About me:

Hello, I’m Chad Russell.  I’ve been in the CyberSecurity industry for over 15 years.  I’ve taught Microsoft Engineering courses as a Certified trainer, I’ve managed teams of security engineers and analysts for an internet banking provider, I’ve been an information security consultant working for companies including SAP, Microsoft and Oracle.   

I lead and conduct 'Security Risk Assessments' for customers throughout North America with an emphasis on cloud security, identity governance, network security, social engineering, mobile security, breach assessments, database security and access management.  

Over the past 15 years I've held numerous certifications including CISSP, CCNP, MCSE and MCDBA certifications and have a B.S. in Computer Science from Excelsior College  I can help you get certified and get ahead!