FSD Secure Database Development
Full Stack
| Intermediate
- 14 videos | 1h 15m 5s
- Includes Assessment
- Earns a Badge
Learners can explore security planning methods and common security and data breach concerns in this 14-video course. Discover best practices for logging and monitoring data security breaches for full stack development, the OWASP best practices, and how to integrate security into the CI/CD pipeline. Key concepts covered in this course include security planning methods and common database security and data breach concerns; best practices for using DB logs to analyze for security and data breaches; and the OWASP security list and its benefits during software development and deployment. Learn how to incorporate data security testing into the CI/CD pipeline; learn the available data Functional Specification Document (FSD) platforms and strengths and weaknesses of each platform; and learn how to install and configure MySQL database locally. Next, learn how to secure a Microsoft SQL Server deployment; harden a local PostgreSQL installation; and secure a MongoDB Atlas cloud database deployment. Finally, learn to harden a deployment of Apache Cassandra; deploy and secure a SQL database on Azure; and create a MySQL instance and database using Google Cloud.
WHAT YOU WILL LEARN
-
Discover the key concepts covered in this courseIdentify security planning methods and common database security and data breach concernsDescribe best practices for using db logs to analyze for security and data breachesDescribe the owasp security list and the benefits of using this list during software development and deploymentDescribe how to incorporate data security testing in the ci/cd pipelineIdentify available data platforms and the strengths and weaknesses of each platformInstall and configure mysql database locally
-
Secure a microsoft sql server deploymentHarden a local postgresql installationSecure a mongodb atlas cloud database deploymentHarden a deployment of apache cassandraDeploy and secure a sql database on azureCreate a mysql instance and database using google cloudSummarize the key concepts covered in this course
IN THIS COURSE
-
1m 12s
-
4m 58sDuring this video, you will learn how to identify security planning methods and common database security and data breach concerns. FREE ACCESS
-
4m 45sUpon completion of this video, you will be able to describe best practices for using DB logs to analyze for security and data breaches. FREE ACCESS
-
6m 1sUpon completion of this video, you will be able to describe the OWASP security list and the benefits of using this list during software development and deployment. FREE ACCESS
-
5m 58sAfter completing this video, you will be able to describe how to incorporate data security testing into the CI/CD pipeline. FREE ACCESS
-
6m 7sIn this video, you will learn how to identify available data platforms and the strengths and weaknesses of each platform. FREE ACCESS
-
8m 45sIn this video, find out how to install and configure a MySQL database locally. FREE ACCESS
-
5m 55sIn this video, learn how to secure a Microsoft SQL Server deployment. FREE ACCESS
-
4m 33sLearn how to harden a local PostgreSQL installation. FREE ACCESS
-
6m 10sIn this video, find out how to secure a MongoDB Atlas cloud database deployment. FREE ACCESS
-
5m 6sIn this video, find out how to secure a deployment of Apache Cassandra. FREE ACCESS
-
7m 44sIn this video, you will learn how to deploy and secure a SQL database on Azure. FREE ACCESS
-
6m 45sIn this video, you will create a MySQL instance and database using Google Cloud. FREE ACCESS
-
1m 8s
EARN A DIGITAL BADGE WHEN YOU COMPLETE THIS COURSE
Skillsoft is providing you the opportunity to earn a digital badge upon successful completion on some of our courses, which can be shared on any social network or business platform.
Digital badges are yours to keep, forever.