name :
8G101G
title :
IBM Security Guardium (V11) Foundations
category :
Security
vendor :
IBM
classroomDeliveryMethod :
Classroom IBM
descriptions :
description :
OverviewAre you getting ready to administer database security policies? Learn how to configure Guardium V11 to discover, classify, analyze, protect, and control access to sensitive data. You will learn to perform vulnerability assessment, and how to monitor data and file activity. This course also teaches you how to create reports, audits, alerts, metrics, and compliance oversight processes. AudienceDatabase administrators, security administrators, security analysts, security technical architects, and professional services using IBM Guardium.PrerequisitesBefore taking this course, make sure that you have the following skills:
  • Working knowledge of SQL queries for IBM DB2 and other databases
  • Working knowledge of NoSQL type databases
  • Working knowledge of UNIX commands
  • Ability to use a UNIX text editor such as vi
  • Familiarity with data protection standards such as HIPAA, PCI, GDPR, and SOX
Objective
  • Identify the primary functions of IBM Security Guardium
  • Apply key Guardium architecture components
  • Navigate the Guardium user interface and command line interface
  • Manage user access to Guardium
  • Build and populate Guardium groups
  • Use the administration console to manage Guardium components
  • Configure policy rules that process the information gathered from database and file servers
  • Use the configuration auditing system, Vulnerability Assessment application, and Database Discovery to perform data security tasks
  • Create queries and reports to examine trends and gather data
  • Automate compliance workflow processes
  • Use file activity monitoring to keep track of the files on your servers
Course OutlineUnit 1: Guardium: OverviewUnit 2: Guardium: ArchitectureUnit 3: Guardium: User interfaceUnit 4: Guardium: Access managementUnit 5: Guardium: GroupsUnit 6: Guardium: System view and data managementUnit 7: Guardium: Policy managementUnit 8: Guardium: Auditing, Vulnerability Assessment, and DiscoveryUnit 9: Guardium: Custom queries and reportsUnit 10: Guardium: Compliance workflow automationUnit 11: Guardium: File activity monitoring
overview :
[Are you getting ready to administer database security policies? Learn how to configure Guardium V11 to discover, classify, analyze, protect, and control access to sensitive data. You will learn to perform vulnerability assessment, and how to monitor data and file activity. This course also teaches you how to create reports, audits, alerts, metrics, and compliance oversight processes.,  ]
abstract :
Are you getting ready to administer database security policies? Learn how to configure Guardium V11 to discover, classify, analyze, protect, and control access to sensitive data. You will learn to perform vulnerability assessment, and how to monitor data and file activity. This course also teaches you how to create reports, audits, alerts, metrics, and compliance oversight processes. 
prerequisits :
objective :
Overview Are you getting ready to administer database security policies? Learn how to configure Guardium V11 to discover, classify, analyze, protect, and control access to sensitive data. You will learn to perform vulnerability assessment, and how to monitor data and file activity. This course also teaches you how to create reports, audits, alerts, metrics, and compliance oversight processes.   Audience Database administrators, security administrators, security analysts, security technical architects, and professional services using IBM Guardium. Prerequisites Before taking this course, make sure that you have the following skills:
  • Working knowledge of SQL queries for IBM DB2 and other databases
  • Working knowledge of NoSQL type databases
  • Working knowledge of UNIX commands
  • Ability to use a UNIX text editor such as vi
  • Familiarity with data protection standards such as HIPAA, PCI, GDPR, and SOX
Objective
  • Identify the primary functions of IBM Security Guardium
  • Apply key Guardium architecture components
  • Navigate the Guardium user interface and command line interface
  • Manage user access to Guardium
  • Build and populate Guardium groups
  • Use the administration console to manage Guardium components
  • Configure policy rules that process the information gathered from database and file servers
  • Use the configuration auditing system, Vulnerability Assessment application, and Database Discovery to perform data security tasks
  • Create queries and reports to examine trends and gather data
  • Automate compliance workflow processes
  • Use file activity monitoring to keep track of the files on your servers
topic :
Course OutlineUnit 1: Guardium: OverviewUnit 2: Guardium: ArchitectureUnit 3: Guardium: User interfaceUnit 4: Guardium: Access managementUnit 5: Guardium: GroupsUnit 6: Guardium: System view and data managementUnit 7: Guardium: Policy managementUnit 8: Guardium: Auditing, Vulnerability Assessment, and DiscoveryUnit 9: Guardium: Custom queries and reportsUnit 10: Guardium: Compliance workflow automationUnit 11: Guardium: File activity monitoring
startDate :
2020-10-30T16:04:07Z
endDate :
2022-03-30T00:00:00Z
lastModified :
2020-10-30T08:00:37Z
created :
2020-02-29T08:00:34Z
duration :
24
durationUnit :
HOURS
ibmIPType :
listPrice :
currency :
badge_Template_ID :
9832a074-371a-4da6-8cb1-15dea6d7efe8
badge_Title :
IBM Guardium Foundations
badge_Url :
https://www.youracclaim.com/org/ibm/badge/ibm-guardium-foundations

Enquire about this course: