Imperva/IU Database Security and Compliance 13.0

IU Database Security and Compliance 13.0 Certification Training Course Overview

IU Database Security and Compliance 13.0 training course is designed for database administrators, security administrators, security engineers responsible for configuring, securing and monitoring their database applications with Imperva Database Security and Compliance.

IU Database Security and Compliance 13.0 (24 Hours) Download Course Contents

Live Virtual Classroom 2950
Group Training Date On Request
1-on-1 Training (GTR)
4 Hours
8 Hours
Week Days
Weekend

Start Time : At any time

12 AM
12 PM

GTR=Guaranteed to Run
Classroom Training (Available: London, Dubai, India, Sydney, Vancouver)
Duration : On Request
Fee : On Request
On Request
Special Solutions for Corporate Clients! Click here
Hire Our Trainers! Click here

Course Modules

Module 1: Initial Database Security Configuration
  • Verify existing Site objects, making any necessary corrections
  • Configure Database Connections on the Database Service.
  • Create Stored Procedure Groups and apply them to their database applications
  • Add the protected DB server’s SSL key to the Database Service.
  • Apply Data Masking to the Database Service.
  • Enable and configure Personal Information Masking.
  • Create SecureSphere Users and Roles.
  • Create and apply a Sensitive Data Dictionary.
  • Compare and contrast two different SecureSphere UI User Roles.
  • View System Job progress.
Module 2: DB Data Classification Scans
  • Define sensitive data.
  • Identify SecureSphere’s predefined data types.
  • Create Custom DB Data Types.
  • Create Scan Profiles.
  • Create and run DB Data Discovery Scans
  • Analyze DB Data Discovery Scan Results.
  • Accept and Reject DB Discovery Scan Results.
  • Review the effect of Accepting DB Discovery Scan Results.
Module 3: DB Security Policies
  • Explain Predefined Policies and Default Policies.
  • Summarize the each of the Default DB Security Policies applied to the SuperVeda Site
  • Explain performance differences between Signatures and Dictionaries
  • Add Followed Actions to SuperVeda’s Default DB Security Policies.
  • Create Custom DB Security Policies.
  • Create a DB Security Policy Configuration Report.
Module 4: DB Profiling
  • Explain how SecureSphere’s Dynamic Profiling works.
  • Explain the structure of Database Profiles and their place in the Sites Tree.
  • Explain Profile Modes and Thresholds
  • Explain the components of DB Profiles.
  • Explain the benefit of creating User Groups for profiles
  • Configure the SQL Profile Policy
  • Disable profiling for a specific database.
  • Configure DB Profile Reports.
Module 5: Database Auditing
  • Explain SecureSphere’s Database Auditing process
  • Explain the Fast Viewing process.
  • Explain SecureSphere’s Audit Archiving and Purging process
  • Identify the data collected by the Default Rule – All Events Audit policy.
  • Create Audit Policies
  • Explain how to share DB Audit Data information with SIEM systems
  • Explain how DB Audit Data Views help administrators analyze audit data.
  • Create Reports directly from the DB Audit Data Views
Module 6: DB Violations and Alerts
  • Define Violations, Alerts, and Alert Aggregation.
  • Explain the components of Violations and Alerts.
  • Use SecureSphere’s Alert Flags to manage alerts.
  • Use the Dashboard to quickly monitor SecureSphere’s current overall state.
  • Configure and run Alert Reports to help analyze the Top Ten attacks against a protected application.
Module 7: Tuning
  • Resolve Connected User and Hashed User when observed in the DB Audit Data
  • Configure SSL and Kerberos Keys.
  • Tune Security Policies and Profiles
  • Tune Audit Policies
  • Configure Agent Exclude from Monitoring Rules.
  • Become familiar with SecureSphere’s Audit Management Statistics.
Module 8: Active Blocking
  • Review SecureSphere’s traffic blocking capabilities
  • Explain the Server Group Operation Modes.
  • List and explain SecureSphere’s Blocking Followed Actions for Database Traffic.
  • Explain the DB Agent’s Modes and how they relate to blocking DB traffic.
  • Describe Imperva’s recommended practices to enable DB traffic blocking.
Module 9: Assessment Scans and Risk
  • Describe the structure of DB Assessment Policies.
  • Configure DB Assessment Scans that implement DB Assessment Policies.
  • Review DB Assessment Scan results
  • Explain how SecureSphere evaluates Risk.
  • Use SecureSphere’s Risk Explorer View to analyze exposure to Risk.
  • Create DB Assessment Scan Result Reports.
Module 10: Database User Rights Management
  • Configure and run DB User Rights Scans.
  • Analyze the Effective Permissions found by the DB User Rights Scan
  • Manage Role and Permission Grants.
  • Create a DB User Rights Report that informs the DBA team which permissions should be corrected
Download Course Contents

Request More Information

Course Prerequisites

Before taking this course, you should have the following skills:

  • Basic understanding of application layer security concepts, application layer Web, and/or database protocols.
  • Working knowledge of implementing or managing data center security or database applications.
  • Imperva Security Administration is recommended.
  • Lesson 1: Course Introduction
  • Lesson 2: Imperva Database Security Introduction
  • Lesson 3: DBS Web UI Navigation
  • Lesson 4: Initial DBS Security Configuration
  • Lesson 5: Database Data Classification Scans
  • Lesson 6: Database Security Policies
  • Lesson 7: Database Profiling
  • Lesson 8: Database Auditing
  • Lesson 9: Troubleshooting
  • Lesson 10: Capstone Lab Exercise

FAQ's


Yes, fee excludes local taxes.