Defense in depth is the practice of implementing multiple layers of security to protect business-critical information.

This session helps security administrators and database administrators better understand the types of attacks that can be used to compromise the security of a data warehouse. The session describes proven best practices that can be used to build a comprehensive, layered defense against these attacks and demonstrates how to use the security features within the Teradata Database and associated platforms to implement a strategy that balances security requirements with other important cost, performance, and operational considerations.

Key Points:

  • Understand the major security threats to a data warehouse 
  • Proven best practices in 24 key areas for implementation of a defense in depth security strategy 

Presenter: Jim Browning, Enterprise Security Architect - Teradata Corporation
 

This course is offered by the Teradata Education Network. To enroll online, click the Training URL link below to go to the TEN site and Log in. If you're not a member click browse, select your region, and search on the Course Number. Or to enroll by phone, call the Enrollment Center at 1-937-242-4460. Note: You must be a member to register for a course.

Audience: Database Administrator, Data Warehouse Architect

Course number:36675
Training URL:http://www.teradata.com/t/ten/
Format:Recorded webcast
Price:$195.00
Credit hours:2.00