IBM GUARDIUM DATABASE SECURITY

IBM Guardium Database Security:

  • Introduction to SQL
  • Introduction to Data Processing using Excel
  • Introduction to Virtualization using VMWARE
  • Introduction to Database Security
  • Guardium Architecture and building Guardium Infrastructure
  • DAM: Database Activity Monitoring
  • Vulnerability Assessment
  • Entitlement Reporting
  • Classification

Overview
Are you getting ready to administer database security policies? Learn how to configure Guardium V10 to discover, classify, analyze, protect, and control access to sensitive data. You will learn to perform vulnerability assessment, and how to monitor data and file activity. This course also teaches you how to create reports, audits, alerts, metrics, and compliance oversight processes.

TARGET AUDIENCE:
IBM Guardium User
Audience
Database administrators, security administrators, security analysts, security technical architects, and professional services using IBM Guardium.

Prerequisites
Before taking this course, make sure that you have the following skills:
Working knowledge of SQL queries for IBM DB2 and other databases
Working knowledge of UNIX commands
Familiarity with data protection standards such as HIPAA and CPI

Objectives:
Identify the primary functions of IBM Guardium
Apply key Guardium architecture components
Create Virtual Machines using ESXI
Install and Configure Guardium appliances ( CM, Aggregators, Collectors) on Virtual Machines
Patch Guardium Appliances
Install the Guardium GIM/STAP agents on Database servers ( Linux & Windows)
Navigate the Guardium user interface and command line interface
Manage user access to Guardium
Use the administration console to manage Guardium components
Build and populate Guardium groups
Configure policy rules that process the information gathered from database and file servers
Use the configuration auditing system, Vulnerability Assessment application, and Database Discovery to perform data security tasks
Create queries and reports to examine trends and gather data
Automate compliance workflow processes
Use file acess monitoring to keep track of the files on your servers