Length – 24 hours
Are you getting ready to administer database security policies? Learn how to configure Guardium V11 to discover, classify, analyze, protect, and control access to sensitive data. You will learn to perform vulnerability assessment, and how to monitor data and file activity. This course also teaches you how to create reports, audits, alerts, metrics, and compliance oversight processes.
Before taking this course, make sure that you have the following skills:
Working knowledge of SQL queries for IBM DB2 and other databases.
Working knowledge of UNIX commands.
Familiarity with data protection standards such as HIPAA and CPI
Database administrators, security administrators, security analysts, security technical architects, and professional services using IBM Guardium.
Working knowledge of SQL queries for IBM DB2 and other databases
Working knowledge of NoSQL type databases
Working knowledge of UNIX commands
Ability to use a UNIX text editor such as vi
Familiarity with data protection standards such as HIPAA, PCI, GDPR, and SOX
Identify the primary functions of IBM Security Guardium
Apply key Guardium architecture components
Navigate the Guardium user interface and command line interface
Manage user access to Guardium
Build and populate Guardium groups
Use the administration console to manage Guardium components
Configure policy rules that process the information gathered from database and file servers
Use the configuration auditing system, Vulnerability Assessment application, and Database Discovery to perform data security tasks
Create queries and reports to examine trends and gather data
Automate compliance workflow processes
Use file activity monitoring to keep track of the files on your servers