Network Security & Database Vulnerabilities

 

IBM Training for Network Security & Database Vulnerabilities

Skill Level: Basic

Modality:  WBT - Web Based Training - Self Paced

Duration: 1.3 Day/s

Starting Price:  $ - 325

Overview:

This course gives you the background needed to understand basic network security, database vulnerabilities and the tools/knowledge needed to research a database vulnerability.

This course provides a background of network security. You will learn the about Local Area Networks, TCP/IP, the OSI Framework and routing basics, how networking affects security systems within an organization, and about the network components that guard an organization from cybersecurity attacks. In addition to networking, you will learn about database vulnerabilities and the tools/knowledge needed to research a database vulnerability for a variety of databases.This course is intended for anyone who wants to gain a basic understanding of cybersecurity. This is the fourth course in a series to acquire the skills to work in the field as a Cybersecurity Analyst.


Request a Quote

Email
Multiple Choice
How did you hear about us?
Yes, I would like to receive special offers from CRS.
Yes, I would like to receive special offers from CRS.


Target Audience:

This course is intended for anyone who wants to gain a basic understanding of Network Security and Database Vulnerabilities or as the fourth course in a series of courses to acquire the skills to work in the Cybersecurity field as a junior cybersecurity analyst..

.

Prerequisites: None.

Topic: Unit 1 -TCP/IP FrameworkUnit 2 - Basics of IP Addressing and the OSI FrameworkUnit 3 - Introduction to DatabasesUnit 4 - Deep Dive - Injection Vulnerability.

IBM Training

Objective: What you can do upon completion of this course:Contrast stateful and stateless inspection

  • Contrast intrusion detection systems (IDSs) and intrusion prevention systems (IPSs)
  • Define network address translation (NAT)
  • Distinguish between static and dynamic IP address translation
  • Describe how Ethernet networks work
  • Distinguish between the Layer 2 and Layer 3 addressing schemes
  • Differentiate between collision and broadcast domains
  • Identify the ways to segment broadcast domains
  • Describe various network devices
  • Distinguish between an IP address and a MAC address
  • Describe how broadcasting domains are used
  • Describe how address resolution protocol (ARP) tables are used
  • Describe the use of routing tables in network routing
  • Convert numbers between binary, octal, decimal, and hexadecimal number systems
  • Describe IPv4’s four-octet format and the five ranges of IPv4’s classful addressing schema
  • Explain how IP addresses work
  • Describe the purpose of subnet masks and gateways
  • Contrast IPv4 and IPv6 addressing
  • Differentiate between the TCP and UDP transport layer protocols
  • Describe the domain name system (DNS), including the service that it provides
  • Describe the dynamic host configuration protocol (DHCP), including the service that it provides
  • Define the Syslog protocol
  • Explain how to use flow utilities such as NetFlow to collect and visualize network traffic flow statistics on routing devices
  • Identify the legitimate and illegitimate uses of port mirroring
  • Contrast traditional firewalls with next-generation firewalls (NGFWs)
  • Explain how NGFWs can inspect and block more intrusion types than is possible with traditional firewalls
  • Describe the flow of packets through an NGFW
  • Describe high availability in information technology
  • Describe how to achieve high availability through clustering
  • Identify various data source types
  • Identify the many data sources present in a typical organization
  • Describe structured data, semi-structured data, and unstructured data
  • Differentiate between a flat-file database and a relational database
  • Describe the activities typically contained in each step of the data security process
  • Identify sources to consult for data security best practices
  • Discuss a typical database access setup
  • Describe a vulnerability assessment test report, including its contents and how to read it
  • Determine the security controls required to protect data given the potential sources of threats and the hosting model used
  • Discuss how each step in the data security process applies to the entire IT and data security landscape
  • Describe the key components of data logging and monitoring
  • Explain the value of real-time policy violation alerts and activity blocking
  • Explain how to generate metrics for logging and audit reporting
  • Describe the event attributes to include in logging
  • Explain how to configure systems to monitor for cybersecurity events
  • Describe the nature of various injection attacks and their prevalence on the threat landscape
  • Describe OS command injection attacks and the operating system flaws that allow them to occur
  • Identify preventative measures against OS command injection attacks
  • Explain how SQL injection works
  • Identify common types of SQL injection
  • Identify preventive measures against SQL injection
  • Describe non-SQL injection attacks such as NoSQL, XPath, and LDAP
  • Identify common vulnerability attacks and defense against them
  • Analyze a web application’s vulnerabilities using OWASP ZAP
  • Create and modify repositories on GitHub
  • Detect and analyze code vulnerabilities using Snyk
  • Examine a repository’s code vulnerabilities using Snyk
  • Evaluate your peers’ completion of GitHub and Snyk tasks using the provided rubric
  • Fork a public GitHub repository
  • Category: Security

     

    Product Name:

    IBM Security Education

     

    Badge and Certification Info:

    Badge Title: Cybersecurity - Network Security & Database Vulnerabilities

    Badge ID: e97ffb11-70bc-4b2a-af91-b9c96c7a2802

     

    Brand: IBM Security

     

    IBM Training is available now.

    Cyber Retaliator Solutions (CRS) is a Cyber Security Distributor, Authorized IBM Training Center, Red Hat and SUSE Training Partner, and a CompTIA Training Delivery Partner, operating throughout the Globe. Our Head Office is in Centurion South Africa, with IBM Training Centers in Centurion, Midrand, Sandton, Cape Town, California CA, Florida FL, New York NY, Washington DC, Georgia GA, Texas TX.

     

    CRS is the Top Global Training Provider for some of the world's biggest brands.

    Authorized Training delivered to you by the global leader in IBM Training.

     

    Select courses in:

    IBM Cloud

    DataPower

    IBM Automation

    IBM Rational

    Watson

    IBM Tivoli

    IBM Systems

    Cognos

    IBM Storage

    Mainframe

    IBM Security

    System Z

    IBM Industry

    IBM Asset Management

    Websphere

    IBM Data and AI

    Get the Best IBM Training from CRS. As an IBM Training Provider, we've partnered with IBM through Arrow ECS to deliver training that covers the full portfolio of IBM systems and software.

    Authorized IBM Training

    RedHat Training

    SUSE Training

    Agile SAFe Training

    Cyber Awareness Training

    Cyber Security

    Get the Best IBM Training from CRS. As an IBM Training Provider, we've partnered with IBM through Arrow ECS to deliver training that covers the full portfolio of IBM systems and software.

     

    Authorized IBM Training
    RedHat Training
    SUSE Training
    Cyber Awareness Training
    Agile SAFe Training
    Cyber Security

     

     

    CRS offers

    IBM Training

    and

    IBM Certification Training

    across

    The United States of America

    with locations:

    4700 Millenia Blvd., Orlando, Florida 32839

    250 Park Avenue, New York, New York 10177

    4900 California Avenue, Tower B, Bakersfield, California 93309

    1300 I Street NW, Washington, District of Columbia 20005

    235 W Roosevelt Ave, Albany, Georgia 31701

    4400 Buffalo Gap Rd., Abilene, Texas 79606

     

     

    Follow CRS:

     

    Follow on Courses:

    Replaced By: 

    8H131 8H130 8H120 8H110 cyber security cybersecurity system analyst

    The price on this page are indicative. Please contact CRS via the above form to confirm pricing.

    Call Now +27 12 023 1959