|
Feb 05, 2025
|
|
|
|
NET 714 - Database Security Course Department: Business 3 Credits Total Lecture Hours: 30 Total Lab Hours: 30 Total Clinical Hours: 0 Course Description: This course covers the fundamentals of database and information systems security. Students will learn how to secure data and information systems, and how to use different database management systems, such as Oracle, MySQL, and Microsoft SQL Server. Students will also learn how to implement and manage database security features, prevent SQL injection attacks, audit and test database systems and applications, and investigate database incidents and breaches. This class will also help you develop your critical thinking skills as you evaluate various technology topics and concepts and find their connections and applications in a lab setting. This skill will help you in any technology career you pursue. Additionally, this class will improve your hands-on technology literacy which will enable you to make informed and effective decisions in your work.
Prerequisites: NET 479 - Principles of Information Security Mode(s) of Instruction: Traditional/Face-to-Face, Online
Course Fees: ebook/Access Code: $124.99 (charged once per term for all courses that use Cengage Unlimited)
Student Learning Outcomes and Objectives:
- Explain the nature and importance of database and information systems security and the main security objectives when protecting information systems.
- Identify and describe the basic components, models, applications, and architectures of different database management systems, such as Oracle, MySQL, and Microsoft SQL Server.
- Install, configure, and secure database management systems for different operating systems and platforms.
- Implement and manage authentication, authorization, users, roles, and privileges for database security using SQL Server, MySQL, and Oracle.
- Identify and prevent SQL injection attacks and exploits using various techniques and tools.
- Perform security auditing and testing for database systems and applications using appropriate methodologies and best practices.
- Use digital forensics tools and techniques to investigate database incidents and breaches.
Add to Pathway (opens a new window)
|
|