DATBASE SECURITY
Introduction and CIA triads
Types of Database Exploits
Array of Beaches
Admin controls users and roles
POLP and Patch Management
Prevention Controls and Encryption
Data Obfuscation, Redaction and Tokenization
Detective Controls 1 – DAM & auditing
Failover and disaster recovery
Regulatory Frameworks 1 – HIPAA
Regulatory Frameworks 2 – PCI
Regulatory Frameworks 3 – SOX & STIG
Regulatory Frameworks 4 – FISMA
Emerging Technologies
Professional Ethics and Responsibilities