Database Security Learning Path

Learn the applicable rules and regulations to protect sensitive data.

8 hours, 11 minutes

Quick facts

About this learning path

  • courses

    100% online

  • Duration

    8 hours, 11 minutes

  • Assessment


About Database Security

The Database Security learning path gives a high-level view of rules and regulations, the NIST Framework and threats and vulnerabilities. This learning path also includes a more detailed view of database protection methods and labs for both a relational and a non-relational (NoSQL) cloud database, with labs and demos on data masking, column-level encryption, least privilege access management, auditing and more.



Database Security Skill Assessment

Assessment - 61 questions

Who's responsible for data security?

Course - 00:21:00

Understanding who is responsible for data security within an organization and what role each employee plays is key to creating an overall strategy. This course discusses the duties of key groups, as well as giving an environment overview.
What data requires elevated security

Course - 00:35:00

Knowing what data requires elevated security due to data sensitivity will influence how an organization needs to go about protecting data. This course covers data classification and NIST categorization. In addition, several laws and regulations that will impact data security are discussed as well.
When is database security important

Course - 00:12:00

Having insight into the three states of data assists in knowing when data security is important. Data should be protected at each state of data. This course defines the three states.
Why is database security necessary

Course - 00:20:00

This course explains why database security is necessary. It goes over some type of threats to an organization's data, including cyber threats and human error. This course also describes the impact of those threats and vulnerabilities and some preventative methods.
How to secure databases in use

Course - 02:15:00

Being aware of how to best protect data in use will be covered within this course. There will be discussion and labs on access control and data obfuscation for both a relational on-premises database and a non-relational cloud database.
How to secure databases in motion

Course - 01:16:00

Data in motion is data moving from one point to another. This course will be a discussion on how to best protect data in motion, along with labs on encryption, views and triggers.
How to secure databases at rest

Course - 01:05:00

Data at rest is data that isn’t being rendered as well as lower-level environments and can be data in connecting environments. This course will discuss the best methods on how to protect data in rest, and physical security of databases. There will be labs on encryption database backups.
Auditing & monitoring

Course - 01:05:00

Auditing and monitoring of both database and server logs can be crucial in uncovering malicious intent. Within log files, crucial information can be uncovered regarding failed login attempts and server performance. This lab will cover auditing logs and error handling, and include labs on log auditing.
Policies & procedures

Course - 00:53:00

Having good policies and procedures in place is paramount in putting all of the pieces together for both data security and disaster recovery. This course will be a discussion on different policies and standards. Includes discussion of change management data flow.

Meet the author

Tonya Davis

Monette Davis is a Microsoft-certified data professional with over 15 years of experience in database administration, data architecture, data security, and data visualization.  Her background includes healthcare, service, retail, television, and banking industries, where she has participated in driving down infrastructure and application vulnerabilities, process improvement, SOX audits, HIPAA regulations evaluations, disaster recovery and business continuity exercises. She has a master's degree in information systems (focusing on cyber security).

In her free time, she enjoys spending time with family and friends, listening to podcasts, and traveling.

The details

Learning path insights

How to claim CPEs

Should you complete this learning path, you’ll be able to download a certificate of completion. Use this to claim your CPEs or CPUs.

Associated NICE Work Roles

All Infosec training maps directly to the NICE Workforce Framework for Cybersecurity to guide you from beginner to expert across 52 Work Roles.

  • All-Source Analyst
  • Mission Assessment Specialist
  • Exploitation Analyst

No software. No set up. Unlimited access.

Skip the server racks and spin up a realistic environment with one click. Infosec Skills cyber ranges require no additional software, hardware or server space so your team can spend less time configuring environments and more time learning. Unlimited cyber range access is included in every Infosec Skills subscription so your team can skill up however they learn best.

Unlock 7 days of free training

  • 1,400+ hands-on courses and labs
  • Certification practice exams
  • Skill assessments

Plans & pricing

Infosec Skills Personal

$299 / year

  • 190+ role-guided learning paths (e.g., Ethical Hacking, Threat Hunting)
  • 100s of hands-on labs in cloud-hosted cyber ranges
  • Custom certification practice exams (e.g., CISSP, Security+)
  • Skill assessments
  • Infosec peer community support

Infosec Skills Teams

$799 per license / year

  • Team administration and reporting
  • Dedicated client success manager
  • Single sign-on (SSO)
    Easily authenticate and manage your learners by connecting to any identity provider that supports the SAML 2.0 standard.
  • Integrations via API
    Retrieve training performance and engagement metrics and integrate learner data into your existing LMS or HRS.
  • 190+ role-guided learning paths and assessments (e.g., Incident Response)
  • 100s of hands-on labs in cloud-hosted cyber ranges
  • Create and assign custom learning paths
  • Custom certification practice exams (e.g., CISSP, CISA)
  • Optional upgrade: Guarantee team certification with live boot camps

Learn about scholarships and financing with

Affirm logo