Securing DB2 Databases is an intense database security training course essential for DBAs and developers who need to produce secure database applications and manage secure databases. In addition to teaching basic skills, this course digs deep into sound processes and practices that apply to the entire software development lifecycle. Perhaps just as significantly, you will learn about current, real examples that illustrate the potential consequences of not following these best practices.
This course quickly introduces you to the most common security vulnerabilities faced by databases today. Each vulnerability is examined from a database perspective through a process of describing the threat and attack mechanisms, recognizing associated vulnerabilities, and, finally, designing, implementing, and testing effective defenses. Multiple practical demonstrations reinforce these concepts with real vulnerabilities and attacks. In this course, you will be challenged to design and implement the layered defenses you will need in defending your own databases.
Security experts agree that the least effective approach to security is "penetrate and patch". It is far more effective to "bake" security into an application throughout its lifecycle. After spending significant time trying to defend a poorly designed (from a security perspective) database application, you will learn how to build secure your databases and applications starting at project inception. The final portion of this course builds on the previously learned mechanics for building defenses by exploring how design and analysis can be used to build stronger applications from the beginning of the software lifecycle.
A key component to our Best Defense IT Security Training Series, this workshop is a companion course with several developer-oriented courses and seminars, and it may be customized to suit your team's unique objectives.
This intermediate-level database course is designed for those who wish to get up and running on developing well-defended DB2 databases and applications.
- Perform a comprehensive set of checks and procedures against DB2 databases and installations
- Rationale for the measures being taken to secure the DB2 databases as well as installations
- Consequences for not properly handling untrusted data such as denial of service, cross-site scripting, and injections
- Test databases with various attack techniques to determine the existence of and effectiveness of layered defenses
- Prevent and defend the many potential vulnerabilities associated with untrusted data
- Concepts and terminology behind supporting, designing, and deploying secure databases
- Problems associated with data security and the potential risks associated with those problems
- Best practices for supporting the many security needs of databases.
- Vulnerabilities associated with authentication and authorization within the context of databases and database applications
- Detect, attack, and implement defenses for authentication and authorization functionality
- Dangers and mechanisms behind Cross-Site Scripting (XSS) and Injection attacks
- Detect, attack, and implement defenses against XSS and Injection attacks
- Concepts and terminology behind defensive, secure coding
- Using Threat Modeling as a tool in identifying software vulnerabilities based on realistic threats against meaningful assets
- Perform both static reviews and dynamic database testing to uncover vulnerabilities
- Design and develop strong, robust authentication and authorization implementations
- Digital Signatures and how to use them as part of the defensive infrastructure for data
- Fundamentals of Encryption and how to use it as part of the defensive infrastructure for data