🇩🇪
Programm
Are you getting ready to administer database security policies? Learn how to configure Guardium to discover, classify, analyze, protect, and control access to sensitive data. You learn to perform vulnerability assessment, and how to monitor data and file activity. This course teaches you how to create reports, audits, alerts, metrics, and compliance oversight processes.

After completing this course, students will be able to:
  • Identify the primary functions of IBM Guardium
  • Apply key Guardium architecture components
  • Navigate the Guardium user interface and command line interface
  • Manage user access to Guardium
  • Use the administration console to manage Guardium components
  • Build and populate Guardium groups
  • Configure policy rules that process the information gathered from database and file servers
  • Use the configuration auditing system, Vulnerability Assessment application, and Database Discovery to perform data security tasks
  • Create queries and reports to examine trends and gather data
  • Automate compliance workflow processes
  • Use file acess monitoring to keep track of the files on your servers
Ziele
  1. Unit 1: IBM Guardium: Overview
  2. Unit 2: IBM Guardium: Architecture
  3. Unit 3: IBM Guardium: User interface
  4. Unit 4: IBM Guardium: Access management
  5. Unit 5: IBM Guardium: System view and data management
  6. Unit 6: IBM Guardium: Groups
  7. Unit 7: IBM Guardium: Policy management
  8. Unit 8: IBM Guardium: Auditing, vulnerability assessment, and discovery
  9. Unit 9: IBM Guardium: Custom queries and reports
  10. Unit 10: IBM Guardium: Compliance workflow automation
  11. Unit 11: IBM Guardium: File activity monitoring
Voraussetzungen
This course requires that you meet the following prerequisites:
  • Working knowledge of SQL queries for IBM DB2 and other databases
  • Working knowledge of UNIX commands
  • Familiarity with data protection standards such as HIPAA and CPI