RCCE Course
Course #1037

Database Activity Monitoring (DAM) and Auditing

📊 Level: Advanced
⏱️ Duration: 2 Days
🏷️ Track: Database Security
📋 Prerequisites: Database Security
🖥️ Mode: Online Instructor-Led
📝 Course Description

RCCE students will learn detecting anomalous queries and maintaining compliance through granular audit logs. RCCE students will learn to apply industry-standard tools and techniques to identify weaknesses and verify security controls. The course covers practical scenarios ranging from initial setup to final reporting. RCCE students will learn to analyze complex systems and think like an attacker to better defend the organization. This comprehensive course delivers practical knowledge applicable to real-world cybersecurity operations. Starting from foundational concepts, RCCE students will learn through a combination of concept explanation, practical demonstration, and hands-on exercises.

🎯 Target Audience
  • Security Engineers building defensive controls
  • Security Analysts and Blue Team members
  • Systems Administrators with security responsibilities
  • GRC and Risk Professionals supporting controls
  • Professionals implementing Database Activity Monitoring (DAM) and Auditing
🧠 What You Will Learn
  • Monitor and audit privilege usage; detect escalation attempts
  • Execute hands-on tasks for key differentiators — covering Real-time capture of database traffic, Cannot be disabled by DBAs, 93% of breaches involve database targets.
  • Execute hands-on tasks for independent from native db logging — covering Cannot be disabled by DBAs.
  • Execute hands-on tasks for why dam matters — covering 93% of breaches involve database targets.
  • Explain DAM Architecture Overview fundamentals
  • Execute hands-on tasks for proxy/agent
  • Design a scalable privilege management architecture with policy and enforcement
  • Execute hands-on tasks for network-based (agentless) — covering Passive network tap / SPAN port.
  • Execute hands-on tasks for inline proxy — covering Query passes through DAM proxy.
  • Monitor and audit privilege usage; detect escalation attempts, including Leverages built-in DB audit.
📚 Course Outline
Module 01Database Activity Monitoring
Module 02What Is Database Activity Monitoring?
Module 03Key Differentiators
Module 04Independent from native DB logging
Module 05Why DAM Matters
Module 06DAM Architecture Overview
Module 07Proxy/Agent
Module 08DAM Deployment Models
Module 09Network-Based (Agentless)
Module 10Inline Proxy
Module 11Native Audit + Forwarding
Module 12Database Audit Log Mechanics
Module 13How Audit Logs Capture Events
Module 14Anomalous Query Detection Methods
🧪 Lab Details

All hands-on labs run on Rocheston Rose X OS. Students practice database activity monitoring (dam) and auditing by implementing the controls discussed in class, with a focus on real-world deployment, monitoring, and validation.

  • Lab 1: Monitor and audit privilege usage; detect escalation attempts
  • Lab 2: Monitor and audit privilege usage; detect escalation attempts
  • Lab 3: Execute hands-on tasks for key differentiators
  • Lab 4: Execute hands-on tasks for independent from native db logging
  • Lab 5: Execute hands-on tasks for why dam matters
📊 Skill Level
Advanced
Beginner Intermediate Advanced Expert
Duration
2 Days
🎓
Certificate
Completion
🖥️
Lab Platform
Rose X OS
👨‍🏫
Mode of Training
Online Instructor-Led
🔥
Platform
Zelfire
🐦‍⬛
Cyber Range
Raven
📓
Study Material
CyberNotes
🏆 Certificate

Upon successful completion of this course, students will receive an official RCCE Course Completion Certificate for Database Activity Monitoring (DAM) and Auditing, verifiable through the Rocheston certification portal.

🔑 Student Access & Materials
  • Full access to all course materials and slide decks
  • Hands-on lab access on Rocheston Rose X OS environment
  • Access to Rocheston CyberNotes
  • Access to Rocheston Zelfire — EDR/XDR SIEM platform
  • Access to Rocheston Raven — online cyber range exercise platform
  • Access to Rocheston Vulnerability Vines AI