Mar 28, 2024  
2023-24 Catalog 
    
2023-24 Catalog
Add to Portfolio (opens a new window)

CIS 310 - Database Installation & Configuration Management

5 Credits
This course provides a foundation in the installation and configuration of popular database systems such as MySQL, SQL Server, Oracle and Postgres. Students will explore the issues encountered on both Windows and Linux operating systems. They will test and document the ways in which database systems are breached from the installation, maintenance, and administrative aspects and how these breaches can be avoided, mitigated, or detected. Installations will take place on physical and virtual environments. When appropriate, cloud services will be used for testing.

Pre-requisite(s) CIS 161 with min 2.0 or equivalent and  CIS 215 with min 2.0 or equivalent
Program Admission Required Yes Admitted Program BAS - CIS
FeesCF

Quarters Typically Offered

Fall Evening
Winter Evening


Designed to Serve For students admitted to the BAS program in CyberSecurity and Forensics.
Active Date 20190625T13:35:34

Grading Basis Decimal Grade
Class Limit 24
Contact Hours: Lecture 44 Lab 22
Total Contact Hours 66
Degree Distributions:
ProfTech Course Yes
Restricted Elective Yes
Course Outline
 

  • Understand Database usage
    • Home Office / Small Business
    • Medium sized companies
    • Enterprise level
  • Database Vulnerabilities
    • Define the common vulnerabilities
    • Implement policies and protocols to mitigate same
  • Operating System Vulnerabilities
    • Windows
    • UNIX/Linux
  • Planning interoperability of DB and Operating System
    • Explain how the operating system installation affects database security
    • Plan and implement installation of both
  • User Security
    • Plan and implement user accessibility levels
    • Explain and implement operating system vs. database system logins
    • Remote management
    • Remote logins
  • Database information assurance
    • Confidential information
    • Personally identifiable information
    • Encryption
    • Password protection
    • Biometrics and other new technology
  • Creating the database
    • Review database types
    • Review of tables, fields, field types etc.
    • Create a relational database
    • Create an object database
  • SQL
    • Basic SQL statements
    • Joins, Views, etc.
    • SQL injections
  • Database security in the cloud
  • Understanding how regulations affect corporate database structure
    • HIPAA
    • FERPA
    • Other regulations
  • Replication, backups and remote storage of data
  • Incident response and disaster recovery


Student Learning Outcomes
Describe the business environments that use databases.

Create policies to mitigate common database and operating system vulnerabilities.

Create and explain the different user accessibility levels to databases.

Apply information assurance policies to database log ins, personally identifiable information and confidential information.

Create effective SQL statements, logic and structures.

Protect database and user interface environment from attacks such as SQL injections.

Create methodology to adhere to various regulations (such as HIPAA and FERPA) that affect data storage.

Create incident response and disaster recovery plans for the database environment.



Add to Portfolio (opens a new window)