Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

IBM

Database Basics and Security

IBM via edX

Overview

With cyberattacks increasingly targeting databases and the average cost of a data breach nearing $5 million, businesses are urgently seeking skilled cybersecurity experts to protect against such threats. This course equips you with essential database security skills that are in high demand.

You'll start by understanding key database concepts, including relational and non-relational databases, and mastering SQL basics. You'’ll practice creating and executing SQL statements and build foundational knowledge in relational data management, roles, and permissions.

The course covers crucial security measures such as encryption, hashing, masking, tokenization, and permission restrictions.

You'll also learn about user profiles, password policies , and privileges, and how to design and implement effective security and auditing models.

Additionally, you'll explore database injection vulnerabilities, including OS command and SQL injections.

As you progress, you will gain hands-on experience through practical labs focusing on user management and ___access control. This course will help you to develop critical database security skills that will make you stand out to employers._

Syllabus

Module 1: Database Fundamentals

Introduction to Data and Databases

Relational Databases

Non-Relational Databases

Relational Data Concepts

Module 2: SQL Basics and Database Management Fundamentals

SELECT Statement

COUNT, DISTINCT, and LIMIT

INSERT Statement

UPDATE and DELETE Statements

Database Roles and Permissions

Database Management

Backing Up Databases

Module 3: Database Security and Data Protection Strategies

Data Types

Data Classifications

General Data Protection Considerations

Methods to Securing Data

Database User Profiles, Password Policies, Privileges, and Roles

Design and Implement Database Application Security Models

Design and Implement Database Auditing Models

Application Data Auditing

Auditing Database Activities

Module 4: Injection Vulnerabilities

Introduction to Injection Flaws

OS Command Injection

SQL Injection

Database Injection Vulnerabilities

Types of Injections

Module 5: Final Assessment and Final Project

Final Project: Comprehensive Database Security and Management

Final Quiz

Intermediate

Some related experience is required.

Taught by

Coreen Ryskamp

Reviews

5.0 rating, based on 1 Class Central review

4.5 rating at edX based on 38 ratings

Start your review of Database Basics and Security

  • Super Super Super Super Super

    Super Super Super Super Super

    Super Super Super Super Super

    Super Super Super Super Super

    Super Super Super Super Super

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.