Database Security Monitoring with Guardium
Security Guardium Data Protection accelerates your Data Protection journey and maturity by providing a comprehensive, risk-based approach to discover, classify, protect and manage critical data assets.
The platform is built on the premise that data protection programs follow an adaptable and structured risk-based framework. The framework is prescriptive based on industry best practices but not necessarily restrictive. Organizations can choose to adapt the framework based on their environmental context and maturity.
Course KeyLearnings
- Identify the primary functions of IBM Security Guardium
- Apply key Guardium architecture components
- Navigate the Guardium user interface and command line interface
- Manage user access to Guardium
- Build and populate Guardium groups
- Use the administration console to manage Guardium components
- Configure policy rules that process the information gathered from database and file servers
- Use the configuration auditing system, Vulnerability Assessment application, and Database Discovery to perform data security tasks
- Create queries and reports to examine trends and gather data
- Automate compliance workflow processes
- Use file activity monitoring to keep track of the files on your servers
Course Outline
Module1: Guardium Overview
Module 2: Guardium Architecture
Module3: Guardium User interface
Module 4: Guardium Access management
Module 5: Guardium Groups
Module6: Guardium: System view and data management
Module 7: Guardium Policy management
Module8: Guardium: Auditing, Vulnerability Assessment, and Discovery
Module 9: Guardium Custom queries and reports
Module10: Guardium: Compliance workflow automation
Module 11: Guardium File activity monitoring
Course Prerequisites
Before taking this course, you must have the following skills:
- Working knowledge of SQL queries for IBM DB2 and other databases
- Working knowledge of NoSQL-type databases
- Working knowledge of UNIX commands
- Ability to use a UNIX text editor such as vi
- Familiarity with data protection standards such as HIPAA, PCI, GDPR, and SOX
Who’s this Course for?
Database administrators, security administrators, security analysts, security technical architects, and professional services using IBM Guardium
INTERNATIONAL STUDENT FEE 500 USD
Job Interview Preparation (Soft Skills Questions & Answers)
- Tough Open-Ended Job Interview Questions
- What to Wear for Best Job Interview Attire
- Job Interview Question- What are You Passionate About?
- How to Prepare for a Job Promotion Interview
Your FREE eLEARNING Courses (Click Here)
Internships, Freelance and Full-Time Work opportunities
- Join Internships and Referral Program (click for details)
- Work as Freelancer or Full-Time Employee (click for details)
Flexible Class Options
- Week End Classes For Professionals SAT | SUN
- Corporate Group Trainings Available
- Online Classes – Live Virtual Class (L.V.C), Online Training
Related Courses
Ethical Hacking Course
Certified Information Security Manager (CISM)
CISA: Certified Information Systems Auditor Exam
Penetration Testing Certificate Training Services
ISO 27001 Information Security Management Systems – ISMS
Computer Hacking Forensic Investigator (CHFI) Training