Database Hardening and Security Standards
RCCE students will learn securing relational database management systems (RDBMS) utilizing CIS benchmarks. RCCE students will learn to apply industry-standard tools and techniques to identify weaknesses and verify security controls. The course covers practical scenarios ranging from initial setup to final reporting. RCCE students will learn to analyze complex systems and think like an attacker to better defend the organization. This comprehensive course delivers practical knowledge applicable to real-world cybersecurity operations. Starting from foundational concepts, RCCE students will learn through a combination of concept explanation, practical demonstration, and hands-on exercises.
- Security Engineers building defensive controls
- Security Analysts and Blue Team members
- Systems Administrators with security responsibilities
- GRC and Risk Professionals supporting controls
- Professionals implementing Database Hardening and Security Standards
- Execute hands-on tasks for security standards
- Explain Course Overview fundamentals
- Execute hands-on tasks for learning objectives
- Execute hands-on tasks for course structure — covering Foundations through advanced scenarios.
- Execute hands-on tasks for prerequisites: basic sql and os admin
- Design a scalable privilege management architecture with policy and enforcement
- Execute hands-on tasks for query engine
- Execute hands-on tasks for storage engine
- Execute hands-on tasks for network layer — covering Tablespace management, Listener/port management.
- Execute hands-on tasks for database attack surface map
- Execute hands-on tasks for query processing — covering SQL injection, stored procedure abuse, UDF exploits.
- Execute hands-on tasks for data storage — covering Unencrypted data-at-rest, backup exposure, temp tables.
| Module 01 | Security Standards |
| Module 02 | Course Overview |
| Module 03 | Learning Objectives |
| Module 04 | Course Structure |
| Module 05 | Prerequisites: basic SQL and OS admin |
| Module 06 | RDBMS Architecture Fundamentals |
| Module 07 | Query Engine |
| Module 08 | Storage Engine |
| Module 09 | Network Layer |
| Module 10 | Database Attack Surface Map |
| Module 11 | Query Processing |
| Module 12 | Data Storage |
| Module 13 | CIS Benchmark Framework Overview |
| Module 14 | CIS Benchmark Levels |
All hands-on labs run on Rocheston Rose X OS. Students practice database hardening and security standards by implementing the controls discussed in class, with a focus on real-world deployment, monitoring, and validation.
- Lab 1: Execute hands-on tasks for security standards
- Lab 2: Explain Course Overview fundamentals
- Lab 3: Execute hands-on tasks for learning objectives
- Lab 4: Execute hands-on tasks for course structure
- Lab 5: Execute hands-on tasks for prerequisites: basic sql and os admin
Upon successful completion of this course, students will receive an official RCCE Course Completion Certificate for Database Hardening and Security Standards, verifiable through the Rocheston certification portal.
- Full access to all course materials and slide decks
- Hands-on lab access on Rocheston Rose X OS environment
- Access to Rocheston CyberNotes
- Access to Rocheston Zelfire — EDR/XDR SIEM platform
- Access to Rocheston Raven — online cyber range exercise platform
- Access to Rocheston Vulnerability Vines AI