0345 4506120

IBM Guardium Foundations

Are you getting ready to administer database security policies? Learn how to configure Guardium to discover, classify, analyze, protect, and control access to sensitive data. You learn to perform vulnerability assessment, and how to monitor data and file activity. This course teaches you how to create reports, audits, alerts, metrics, and compliance oversight processes.

Target Audience

Database administrators, security administrators, security analysts, security technical architects, and professional services using IBM Guardium.

  Reset

Learning Objectives

  • Identify the primary functions of IBM Guardium
  • Apply key Guardium architecture components
  • Navigate the Guardium user interface and command line interface
  • Manage user access to Guardium
  • Use the administration console to manage Guardium components
  • Build and populate Guardium groups
  • Configure policy rules that process the information gathered from database and file servers
  • Use the configuration auditing system, Vulnerability Assessment application, and Database Discovery to perform data security tasks
  • Create queries and reports to examine trends and gather data
  • Automate compliance workflow processes
  • Use file acess monitoring to keep track of the files on your servers

Pre-Requisites

Before taking this course, make sure that you have the following skills:

  • Working knowledge of SQL queries for IBM DB2 and other databases
  • Working knowledge of UNIX commands
  • Familiarity with data protection standards such as HIPAA and CPI

Course Content

Unit 1: IBM Guardium: Overview

Unit 2: IBM Guardium: Architecture

Unit 3: IBM Guardium: User interface

Unit 4: IBM Guardium: Access management

Unit 5: IBM Guardium: System view and data management

Unit 6: IBM Guardium: Groups

Unit 7: IBM Guardium: Policy management

Unit 8: IBM Guardium: Auditing, vulnerability assessment, and discovery

Unit 9: IBM Guardium: Custom queries and reports

Unit 10: IBM Guardium: Compliance workflow automation

Unit 11: IBM Guardium: File activity monitoring

 

Privacy Notice

In order to provide you with the service requested we will need to retain and use your contact information in accordance with our Privacy Notice. If you choose to provide us with this information you explicitly consent to us using the information as necessary to provide the request service to you. If you do not agree please do not proceed to request the service from us.

Marketing Permissions

Would you like to receive our newsletter and other information on products and services which we think will be of interest to you by email. We will always treat your information with care and in accordance with our Privacy Notice. You are free to withdraw this permission at any time.

 

Virtual Classroom

Virtual classrooms provide all the benefits of attending a classroom course without the need to arrange travel and accomodation. Please note that virtual courses are attended in real-time, commencing on a specified date.

Virtual Course Dates

Our Customers Include