IU Database Security and Compliance 13.0 Course Overview

IU Database Security and Compliance 13.0 training course is designed for database administrators, security administrators, security engineers responsible for configuring, securing and monitoring their database applications with Imperva Database Security and Compliance.

This is a Rare Course and it can be take up to 3 weeks to arrange the training.

  • 1. Do you have limited Window for training?
  • 2. Can you only spend 4-hours per day?
  • 3. Do you want to start training immediately?
  • If your answer is yes to any one of the above, you need 1-on-1- Training
The 1-on-1 Advantage
Methodology
Flexible Dates
4-Hour Sessions
  • View video
  • The course will be free if we are not able to start within 7 days of booking.
  • Only applicable for courses on which this logo appears.

Your will learn:

Module 1: Initial Database Security Configuration
  • Verify existing Site objects, making any necessary corrections
  • Configure Database Connections on the Database Service.
  • Create Stored Procedure Groups and apply them to their database applications
  • Add the protected DB server’s SSL key to the Database Service.
  • Apply Data Masking to the Database Service.
  • Enable and configure Personal Information Masking.
  • Create SecureSphere Users and Roles.
  • Create and apply a Sensitive Data Dictionary.
  • Compare and contrast two different SecureSphere UI User Roles.
  • View System Job progress.
  • Define sensitive data.
  • Identify SecureSphere’s predefined data types.
  • Create Custom DB Data Types.
  • Create Scan Profiles.
  • Create and run DB Data Discovery Scans
  • Analyze DB Data Discovery Scan Results.
  • Accept and Reject DB Discovery Scan Results.
  • Review the effect of Accepting DB Discovery Scan Results.
  • Explain Predefined Policies and Default Policies.
  • Summarize the each of the Default DB Security Policies applied to the SuperVeda Site
  • Explain performance differences between Signatures and Dictionaries
  • Add Followed Actions to SuperVeda’s Default DB Security Policies.
  • Create Custom DB Security Policies.
  • Create a DB Security Policy Configuration Report.
  • Explain how SecureSphere’s Dynamic Profiling works.
  • Explain the structure of Database Profiles and their place in the Sites Tree.
  • Explain Profile Modes and Thresholds
  • Explain the components of DB Profiles.
  • Explain the benefit of creating User Groups for profiles
  • Configure the SQL Profile Policy
  • Disable profiling for a specific database.
  • Configure DB Profile Reports.
  • Explain SecureSphere’s Database Auditing process
  • Explain the Fast Viewing process.
  • Explain SecureSphere’s Audit Archiving and Purging process
  • Identify the data collected by the Default Rule – All Events Audit policy.
  • Create Audit Policies
  • Explain how to share DB Audit Data information with SIEM systems
  • Explain how DB Audit Data Views help administrators analyze audit data.
  • Create Reports directly from the DB Audit Data Views
  • Define Violations, Alerts, and Alert Aggregation.
  • Explain the components of Violations and Alerts.
  • Use SecureSphere’s Alert Flags to manage alerts.
  • Use the Dashboard to quickly monitor SecureSphere’s current overall state.
  • Configure and run Alert Reports to help analyze the Top Ten attacks against a protected application.
  • Resolve Connected User and Hashed User when observed in the DB Audit Data
  • Configure SSL and Kerberos Keys.
  • Tune Security Policies and Profiles
  • Tune Audit Policies
  • Configure Agent Exclude from Monitoring Rules.
  • Become familiar with SecureSphere’s Audit Management Statistics.
  • Review SecureSphere’s traffic blocking capabilities
  • Explain the Server Group Operation Modes.
  • List and explain SecureSphere’s Blocking Followed Actions for Database Traffic.
  • Explain the DB Agent’s Modes and how they relate to blocking DB traffic.
  • Describe Imperva’s recommended practices to enable DB traffic blocking.
  • Describe the structure of DB Assessment Policies.
  • Configure DB Assessment Scans that implement DB Assessment Policies.
  • Review DB Assessment Scan results
  • Explain how SecureSphere evaluates Risk.
  • Use SecureSphere’s Risk Explorer View to analyze exposure to Risk.
  • Create DB Assessment Scan Result Reports.
  • Configure and run DB User Rights Scans.
  • Analyze the Effective Permissions found by the DB User Rights Scan
  • Manage Role and Permission Grants.
  • Create a DB User Rights Report that informs the DBA team which permissions should be corrected
Live Online Training (Duration : 24 Hours) Fee On Request
Group Training Date On Request
1-on-1 Training
4 Hours
8 Hours
Week Days
Weekend

Start Time : At any time

12 AM
12 PM

1-On-1 Training is Guaranteed to Run (GTR)
Classroom Training (Available: London, Dubai, India, Sydney, Vancouver)
Duration : On Request
Fee : On Request
On Request
Classroom Training is available. Enquire for the fee Click
Ultra-Fast Track

If you can't spare 24 hours. We can offer you an Ultra-Fast Track for 12 hours

Course Prerequisites

Before taking this course, you should have the following skills:

  • Basic understanding of application layer security concepts, application layer Web, and/or database protocols.
  • Working knowledge of implementing or managing data center security or database applications.
  • Imperva Security Administration is recommended.
  • Lesson 1: Course Introduction
  • Lesson 2: Imperva Database Security Introduction
  • Lesson 3: DBS Web UI Navigation
  • Lesson 4: Initial DBS Security Configuration
  • Lesson 5: Database Data Classification Scans
  • Lesson 6: Database Security Policies
  • Lesson 7: Database Profiling
  • Lesson 8: Database Auditing
  • Lesson 9: Troubleshooting
  • Lesson 10: Capstone Lab Exercise

Request More Information

Add Name and Email Address of participant (If different from you)

FAQ's


No, the published fee includes all applicable taxes.
The Fee includes:
  • Courseware
Yes, Koenig Solutions is a Imperva Learning Partner