Live Chat
Monday - Friday 8am - 6pm EST Chat Now
Contact Us
Monday - Friday 8am - 8pm EST 1-866-716-6688 Other Contact Options
Checkout

Cart () Loading...

    • Quantity:
    • Delivery:
    • Dates:
    • Location:

    $

IBM Guardium Foundations V10

Learn to administer database security policies with Guardium.

GK# 4543 Vendor# 8G100G

Course Overview

TOP

In this course, you will learn how to configure Guardium for discovering, classifying, analyzing, protecting, and controlling access to sensitive data. You will learn how to perform vulnerability assessment as well as monitor data and file activity. You will also learn how to create reports, audits, alerts, and metrics.

Schedule

TOP
  • Delivery Format:
  • Date:
  • Location:
  • Access Period:

$

What You'll Learn

TOP
  • Primary functions of IBM Guardium
  • Key Guardium architecture components
  • Guardium user interface and command line interface
  • User access to Guardium
  • Administration console to manage Guardium components
  • Guardium groups
  • Policy rules that process the information gathered from database and file servers
  • Use the configuration auditing system, vulnerability assessment application, and database discovery to perform data security tasks
  • Create queries and reports to examine trends and gather data
  • Automate compliance workflow processes
  • Use file access monitoring to keep track of the files on your servers

Outline

TOP
Viewing outline for:

Virtual Classroom Live Outline

  1. IBM Guardium: Overview
  2. IBM Guardium: Architecture
  3. IBM Guardium: User Interface
  4. IBM Guardium: Access Management
  5. IBM Guardium: System View and Data Management
  6. IBM Guardium: Groups
  7. IBM Guardium: Policy Management
  8. IBM Guardium: Auditing, Vulnerability Assessment, and Discovery
  9. IBM Guardium: Custom Queries and Reports
  10. IBM Guardium: Compliance Workflow Automation
  11. IBM Guardium: File Activity Monitoring

Prerequisites

TOP

Before taking this course, make sure that you have the following skills:

  • Working knowledge of SQL queries for IBM DB2 and other databases
  • Working knowledge of UNIX commands
  • Familiarity with data protection standards such as HIPAA and CPI

Who Should Attend

TOP

Database administrators, security administrators, security analysts, security technical architects, and professional services using IBM Guardium.

Course Delivery

This course is available in the following formats:

Virtual Classroom Live

Experience expert-led online training from the convenience of your home, office or anywhere with an internet connection.

Duration: 3 day

Classroom Live

Receive face-to-face instruction at one of our training center locations.

Duration: 3 day

Request this course in a different delivery format.
Enroll