IBM Security Guardium Foundations (V11) [8G101G]

Total time
Location
At location
Starting date and place
Logo Global Knowledge Network Training Ltd.

Need more information? Get more details on the site of the provider.

Starting dates and places

place(Virtual Training Centre)
9 Feb 2022 until 11 Feb 2022
place(Virtual Training Centre)
24 Aug 2022 until 26 Aug 2022

Description

OVERVIEW

Are you getting ready to administer database security policies? Learn how to configure Guardium V11 to discover, classify, analyze, protect, and control access to sensitive data. You will learn to perform vulnerability assessment, and how to monitor data and file activity. This course also teaches you how to create reports, audits, alerts, metrics, and compliance oversight processes.

OBJECTIVES

  • Identify the primary functions of IBM Security Guardium
  • Apply key Guardium architecture components
  • Navigate the Guardium user interface and command line interface
  • Manage user access to Guardium
  • Build and populate Guardium groups
  • Use the administration console to manage Guardium components
  • Co…

Read the complete description

Frequently asked questions

There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.

OVERVIEW

Are you getting ready to administer database security policies? Learn how to configure Guardium V11 to discover, classify, analyze, protect, and control access to sensitive data. You will learn to perform vulnerability assessment, and how to monitor data and file activity. This course also teaches you how to create reports, audits, alerts, metrics, and compliance oversight processes.

OBJECTIVES

  • Identify the primary functions of IBM Security Guardium
  • Apply key Guardium architecture components
  • Navigate the Guardium user interface and command line interface
  • Manage user access to Guardium
  • Build and populate Guardium groups
  • Use the administration console to manage Guardium components
  • Configure policy rules that process the information gathered from database and file servers
  • Use the configuration auditing system, Vulnerability Assessment application, and Database Discovery to perform data security tasks
  • Create queries and reports to examine trends and gather data
  • Automate compliance workflow processes
  • Use file activity monitoring to keep track of the files on your servers

AUDIENCE

Database administrators, security administrators, security analysts, security technical architects, and professional services using IBM Guardium.

CONTENT

Unit 1: Guardium: Overview

Unit 2: Guardium: Architecture

Unit 3: Guardium: User interface

Unit 4: Guardium: Access management

Unit 5: Guardium: Groups

Unit 6: Guardium: System view and data management

Unit 7: Guardium: Policy management

Unit 8: Guardium: Auditing, Vulnerability Assessment, and Discovery

Unit 9: Guardium: Custom queries and reports

Unit 10: Guardium: Compliance workflow automation

Unit 11: Guardium: File activity monitoring

There are no reviews yet.

Share your review

Do you have experience with this course? Submit your review and help other people make the right choice. As a thank you for your effort we will donate £1.- to Stichting Edukans.

There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.