IBM Guardium Operations and Administration course
Control over sensitive organization data has become a real priority for system teams. Hence the importance of solutions such as IBM Guardium has become increasingly decisive. Thanks to this revolutionary technology, discovering, classifying, analyzing, protecting and controlling access to sensitive data can be a relatively simple and secure process.
With the help of our experts, you will be able to detect potential vulnerabilities and control your critical data and files. During the course we will show you how to create reports and audits. Not forgetting about alerts, metrics, and other compliance monitoring processes for different security policies.
Agenda
- IBM Guardium core functions.
- Key components of the IBM Guardium architecture.
- User interface and command line.
- Management of users and groups.
- Management Console.
- Policy rules for processing information collected from the database and file servers.
- Configuration auditing. Vulnerability assessment and database detection.
- Consultations and reports to examine trends of interest.
- Automation of compliance workflows.
- Monitoring file access to track files on your servers.
Audience This course is intended for system and database administrators.