Cover all your bases.
CyberVista is currently developing a 100% online cybersecurity training program designed to help database administrators apply cybersecurity practices to ensure data availability and protection from loss and corruption.
Cybersecurity for Database Administrators
With the rise of advanced technology such as Artificial Intelligence (AI) and machine learning, the sheer amount and rate at which organizations generate data has increased exponentially. Meaning, the responsibility of those in charge of optimizing storage, organization, collection, and processing of data, carry a heavy weight of not only keeping up but keeping the data secured.
Database administrators are, in essence, the holders of the organization’s crown jewels. They know the what, where, and how behind accessing and utilizing critical data; and though it’s not traditionally defined as a cybersecurity role, having fundamental cybersecurity knowledge as it applies to data administration can ensure data integrity from the start.
CyberVista is developing a new online cybersecurity training course for database administrators to apply cybersecurity practices to ensure data availability and protection from loss and corruption. This 100% online program will be available in the coming months. If this is in alignment with your organization’s long term goals, be the first to know about its release by signing up for our product development updates.
What is the format of this course?
This program is a role-based training, comprehensive course that acts as a precursor to the Critical Knowledge training program. This course covers fundamental cybersecurity concepts and skills relevant to the day-to-day management and responsibilities of Database Administrators and other information technology roles.
While detailed specifics will be available soon, this course will be delivered 100% online and will be available through On-Demand or Live Online delivery, with a host of other tools and resources housed within CyberVista’s online platform.
Who is this course for?
This course is designed to train Database Administrators of all experience levels that are currently responsible for tasks or subject areas that are cybersecurity-related in their nature. This offering is applicable across all industries. The following job titles are also likely covered within the subject matter of this program:
- Data Center Support Specialist
- Data Quality Manager
- Oracle DBA
- Database Developer
What are the benefits of this course?
Organizations participating in this offering will experience the following major benefits:
- Efficiently improve knowledge, skills, and abilities related to day-to-day system administrator duties
- Mitigate immediate weaknesses across critical cybersecurity knowledge and skill areas
- Align cybersecurity practices to ensure data availability and protection from loss and corruption
Sign up for program updates.
Cyber-Enabled Score: 4.0 Highly Cyber-Enabled
While not a dedicated cybersecurity role, Network Administrators manage access to an organization’s network and its connected systems. Likewise, Network Admins have access to myriads of sensitive information that presents quantifiable cyber risk to their organization.
THIS OFFERING INCLUDES
An intelligent solution.
Final Workforce Analysis
Easily administer a diagnostic assessment is used to determine each team member’s strengths and weaknesses.
Engage with introductory videos, modular lessons, and lab walk-through videos.
When only practical experience will suffice, work through lab exercises to reinforce real-world skills applications.
Participants conclude training with a final assessment to determine improvement across knowledge and skills.
Final Workforce Analysis
Final Workforce Analysis
Receive valuable workforce and cybersecurity insights based on team performance.
01. SOC Organization & Processes
Learners will understand the roles and responsibilities of both the SOC and the SOC analysts within an organization.
This unit covers the SOC as a whole along with the roles and responsibilities of SOC analysts (by tiers) and other related teams.
02. Threats & Vulnerability Analysis
Learners will be able to conduct vulnerability assessment and analysis, threat research, and establish known-good and known-bad network baselines.
This unit teaches how to conduct a vulnerability assessment, how to analyze the results of the assessment, and how to conduct further research based on findings (e.g., relevant threat actors, known signatures, etc.).
03. Device Log Analysis
Learners will understand the importance and mechanisms of device logs, be able to conduct log analysis, and create scripts to automate analysis.
This unit covers how to find the logs on a machine (both Windows and Linux), analyze the logs for any suspicious activity, create alert triggers for IDS technologies, and create basic scripts in bash/PowerShell and Python for automation strategies.
04. Comprehensive Org. Event Correlation
Learners will understand the purpose and application of SIEMs, conduct analysis of SIEM results, correlate multiple network events, and detect evidence of post-attack strategies.
This unit covers an introduction to SIEMs, exposure to a SIEM interface, and tools/techniques to analyze SIEM results.
05. PCAP Analysis
Learners will be able to capture live traffic and conduct analysis on captured packets for indicators of network attacks.
This unit covers how to create PCAP files, and the different analysis techniques used to identify network attacks.
06. Incident Response
Learners will understand the Incident Response phases and determine indicators of compromise for given incidents.
This unit gives the students a taste of incident handling and provides further practice of PCAP/Log analysis.