powered by
Center for Curriculum and Transfer Articulation
Database Management and Security
Course: CIS376

First Term: 2023 Fall
Lecture   4.0 Credit(s)   4.0 Period(s)   4.0 Load  
Subject Type: Occupational
Load Formula: S- Standard


Description: Overview of the functional areas, concepts and techniques of database management and security. Topics include business and regulatory requirements, database architecture and design, access control, retrieval concepts, data auditing, incident response and optimal database system performance, security and availability. Explores new directions in database management and security.



MCCCD Official Course Competencies
1. Understand database architecture and design for business solutions. (I)
2. Evaluate security management for database environments. (II)
3. Evaluate strategies to maintain optimal system performance, security and availability. (III)
4. Assess practices for database environment incident responses. (IV)
5. Evaluate current practices and future trends of database management and security. (V)
MCCCD Official Course Competencies must be coordinated with the content outline so that each major point in the outline serves one or more competencies. MCCCD faculty retains authority in determining the pedagogical approach, methodology, content sequencing, and assessment metrics for student work. Please see individual course syllabi for additional information, including specific course requirements.
 
MCCCD Official Course Outline
I. Foundation of database architecture and design
   A. Infrastructure architecture
      1. Service model (on-premise vs. cloud)
      2. Network security tiers/zones (deploy database at a secure/dedicated tier - network placement and mapping)
      3. Identity and access management
      4. Tools and software
   B. Database specification requirements
      1. Hardware
      2. Size
      3. Throughput
      4. Usage
   C. Data model
      1. Database integrity support
      2. Data usage analysis
         a. Transactional vs. reporting/analysis
         b. Relational vs noSQL/Big Data
         c. Other
   D. Business and regulatory requirements
      1. Health Insurance Portability and Accountability Act (HIPAA)
      2. Family Educational Rights and Privacy Act (FERPA)
      3. Data compliance
         a. Separation
         b. Retention
         c. Other
   E. Other
II. Database security management
   A. Access control
      1. Service account authentication and authorization
      2. User management (passwords, profiles, privileges, roles)
      3. Role based access
      4. Security/compliance access review
   B. Data auditing
      1. Log management
      2. Data security reviews
   C. Retrieval concepts
      1. Encryption for data at rest versus data in motion
      2. Other
III. Optimal system performance, security and availability
   A. Performance tuning methods and considerations
      1. Code design
      2. Storage mechanism
      3. Network issues
      4. Processing
   B. Redundancy in design and storage
      1. Backup
      2. High availability options
         a. On premise
         b. Cloud
      3. Advantages
      4. Disadvantages
      5. Security considerations
   C. Disaster recovery
      1. Business and regulatory requirements
         a. Data retention policies
            (1) Number of years
            (2) Type/format of media
            (3) Offsite/remote storage
            (4) Other
         b. Other
      2. Identification of data
      3. Recovery strategies
   D. Vulnerability management
      1. Security patches
      2. Security protocols
      3. Vulnerability scanning
      4. Structured Query Language (SQL) injection
      5. Other
   E. Database security alternate solutions
      1. Cloud security services
      2. Other
   F. Routine system performance and security analysis
      1. Logs
      2. Historical records
      3. Reports
      4. Audits
         a. Access
         b. Performance
         c. Regulatory compliance
         d. Scheduling
IV. Incident response
   A. Scope analysis/damage control
   B. Usage log analysis
   C. Regulatory compliance
   D. Disaster recovery
V. Database management and security
   A. Current practices
   B. Future trends
 
MCCCD Governing Board Approval Date: August 23, 2022

All information published is subject to change without notice. Every effort has been made to ensure the accuracy of information presented, but based on the dynamic nature of the curricular process, course and program information is subject to change in order to reflect the most current information available.