How to Secure Databases in Use

In this course you’ll explore the best methods to secure databases in use.

10 videos  //  105 minutes of training

Course description

Being aware of how to best protect data in use will be covered within this course. There will be discussion and labs on access control and data obfuscation for both a relational on-premises database and a non-relational cloud database.

Course syllabus

Methods to Protect Data in UseDuration: 5:00

Discuss different methods of protecting data in use (least privilege, data masking, data isolation, autonomy and data redaction).

Set Up SQL EnvironmentDuration: 6:00

Demonstration of setting up an SQL Express environment for labs

Set Up a MongoDB EnvironmentDuration: 9:27

Demonstration of setting up a MongoDB environment for labs

Access Management - Database SecurityDuration: 15:14

Discuss database access management, strong passwords, password rotation, two-factor authentication and more password concerns.

Demo Least Privileges (RDMS)Duration: 30:23

Demonstrate access and least privileges on SQL Server (Lab 1).

Demo Least Privileges (NoSQL)Duration: 18:51

Demonstrate access and least privileges on MongoDB (Lab 2).

Data Masking MethodsDuration: 5:52

Discuss data masking methods.

Demo Masking (RDMS)Duration: 8:00

Demo data masking (Lab 3).

Data Masking (NoSQL) Third-Party ToolsDuration: 3:14

Briefly discuss third-party tools, out of scope.

Recap of Protecting Data in UseDuration: 3:05

Recap the information discussed in this course.

Meet the author

Monette Davis

LinkedIn

Monette Davis is a Microsoft-certified data professional with 15 years of experience in database administration, data architecture, data security and data visualization. Her background includes healthcare, service, retail and television industries, where she has participated in SOX audits, HIPAA regulation evaluations and disaster recovery and business continuity exercises. She has a bachelor’s degree in computer information systems and is currently working on her master’s in information systems.

In her free time, she enjoys spending time with family and friends, listening to podcasts and having fun outdoors.

Plans & pricing

Infosec Skills Personal

  • 190+ role-guided learning paths (e.g., Ethical Hacking, Threat Hunting)
  • 100s of hands-on labs in cloud-hosted cyber ranges
  • Custom certification practice exams (e.g., CISSP, Security+)
  • Skill assessments
  • Infosec peer community support

Infosec Skills Teams

$799 per license / year

Book a Meeting
  • Team administration and reporting
  • Dedicated client success manager
  • Single sign-on (SSO)
    Easily authenticate and manage your learners by connecting to any identity provider that supports the SAML 2.0 standard.
  • Integrations via API
    Retrieve training performance and engagement metrics and integrate learner data into your existing LMS or HRS.
  • 190+ role-guided learning paths and assessments (e.g., Incident Response)
  • 100s of hands-on labs in cloud-hosted cyber ranges
  • Create and assign custom learning paths
  • Custom certification practice exams (e.g., CISSP, CISA)
  • Optional upgrade: Guarantee team certification with live boot camps

Award-winning training that you can trust

IDC MarketScape Leader: U.S. IT Training

IDC MarketScape Leader: U.S. IT Training

Infosec Skills

eLearning Content

eLearning Content

Infosec Skills

Best Product - Cybersecurity Training for Infosec Professionals

Best Product - Cybersecurity Training for Infosec Professionals

Infosec Skills

Security Education & Platform

Security Education & Platform

Infosec Skills

Ranked #52 in Top 100 Global Software Sellers

Ranked #52 in Top 100 Global Software Sellers

Infosec