Apr 24, 2024  
2023-24 Catalog 
    
2023-24 Catalog
Add to Portfolio (opens a new window)

CIS 412 - Database Security and Audit

5 Credits
Data breaches are a common occurrence in today’s society. This course builds on the foundational knowledge from CIS 310 and the big data analytics course CIS 389. Students address design issues, along with user interface vulnerabilities and how these can be avoided, mitigated, or detected. Learning modules will address web interfaces, cloud services, and mobile application database vulnerabilities. Students will use tools to perform database audits and create policies and procedures to augment the same. The audits taught in this course pertain to both the database and operating system levels. Students also learn the challenges of big data security issues. Hands-on projects will take place in physical, virtual, and cloud environments.

Pre-requisite(s) CIS 310 min 2.0 and CIS 389 min 2.0
Program Admission Required Yes Admitted Program BAS - CIS
FeesCF

Quarters Typically Offered
Fall Evening
Designed to Serve For students admitted to the BAS program in CyberSecurity and Forensics.
Active Date 20230320T11:43:30

Grading Basis Decimal Grade
Class Limit 24
Contact Hours: Lecture 44 Lab 22
Total Contact Hours 66
Degree Distributions:
ProfTech Course Yes
Restricted Elective Yes
Course Outline
  • User administration in databases
  • Database application security models
    • Database application security models introduction
    • Stored procedures
    • Trigger
  • Common database attacks and mitigation
  • Find and exploit the vulnerability of databases
  • Conduct database audit
    • Its usage and purpose
    • How to plan, implement and report on an audit
  • Auditing database activities
    • Plan audit
    • Creating policies and procedures for security audits
    • Implement audit
    • Audit report
  • Cloud deployment of databases and security issues
  • Review statistical and big data analysis
    • Install a database cluster
    • Use in the security arena
    • How to use in an audit
  • Integrate Active Directory users and groups to databases
  • Database encryption and backup
  • Future issues


Student Learning Outcomes
Install databases in a variety of environments, including local, virtualization and cloud environment.

Generate a mitigation plan based on the vulnerabilities identified during database penetration testing.

Implement database audits.

Perform best practices to secure databases and systems.

Determine security actions based on statistical and Big Data analysis.

Install active directory (AD) and integrate AD users and groups to databases.

Conduct database encryption and perform analysis.



Add to Portfolio (opens a new window)