Apr 19, 2024  
2023-24 Catalog 
    
2023-24 Catalog
Add to Portfolio (opens a new window)

CIS 414 - Advanced Database Security

5 Credits
Students build on skills learned in earlier database security courses by extending their practice into cloud environments. Students work through cloud labs and design reproducible builds that deploy to hosted infrastructure. Attention will be paid to the identity and access management and to the system, network, and data security features of this type of environment. 

Pre-requisite(s) CIS 412 min. 2.0
Program Admission Required Yes Admitted Program BAS - CIS
FeesCF

Quarters Typically Offered
Winter Evening
Spring Evening

Designed to Serve For students admitted to the BAS program in CyberSecurity and Forensics.
Active Date 20230320T11:43:35

Grading Basis Decimal Grade
Class Limit 24
Contact Hours: Lecture 44 Lab 22
Total Contact Hours 66
Degree Distributions:
ProfTech Course Yes
Restricted Elective Yes
Course Outline
  1. Review database security principles
  2. Laws and policies that affect database security
    1. PCI
    2. HIPAA
    3. FERPA
    4. Others
  3. Distributed database security
    1. Identity access management
    2. Host security
    3. Network security
  4. Automated deployment of installation and deployment of database infrastructure
  5. Cloud environments
  6. Use relevant programming and scripting languages to automate database deployment, configuration changes, and tests
  7. Encryption
    1. At rest
    2. In transit
    3. Document database  security issues
  8. Database infrastructure maintenance
  9. Testing, hardening, and defending database infrastructure


Student Learning Outcomes
Design improvements and redeploy infrastructure through architectural review and security audits

Create database infrastructure through automation

Install database infrastructure in a variety of environments including cloud environments

Design and apply technical configurations to accommodate the laws and policies relevant to data protection

Apply identity and access management schemas for database infrastructure

Implement encryption techniques for data at rest and in transit



Add to Portfolio (opens a new window)