Está en la página 1de 3

Data modeling and ORACLE

Session 1: Introduction to databases, DBMS, RDBMS, OODBMS. ACID properties, logical


schema, physical schema, Basics of data modeling.
Session 2: Data modeling Database industry overview, Entities, Relationship types, ER
Diagramming, Exercises
Session 3: Binary and multi-way relationships, subclasses, design principles, Exercises.
Session 4: relational terminology, ER conversion rules, converting inheritance hierarchies, ER
style, OO style, Nulls style
Session 5: Anomalies, Normalization, Types of normal forms, Boyce-Codd NF, Decomposition
Session 6: SQL Basics, DDL & DML statement syntax, data types, tables, keys, exercises.
Session 7: SQL continued. Variations of select, complex queries, nested queries, LIKE operator,
escape characters, ORDER BY, GROUP BY, JOINS, Tuple variables.
Session 8: ORACLE system Architecture, SGA, PGA, processes, datafiles, control files,
tablespaces, extents, segments, rollback segments, query execution, storage clause.
Session 9: SQL *Plus basics. Practical implementation of all SQL done so far.
Session 10: Exercise on modeling and implementation.
Assessment.

Network Security
1. Concepts
a)
b)
c)
d)

The TCP/IP protocol suite


Need for network management
Types of threats to information security
Emerging trends in patterns of intrusions

2. Key Concepts of Network Management

a) Basic Concepts of SNMP


b) SNMP Community Facility
c) SNMPv3
d) Network Management Systems
e) Demonstration of Unicentre
3. Hacking - A Demonstration
a) Basic tools
b) Breaking in to your own system
4. Evaluation of New generation products
a) Routers, Proxies, and Firewalls
b) Optimal configuration of products
6. Main Vulnerabilities of Operating Systems
a)
b)
c)
d)
e)
f)
g)
h)
i)

Password control
"Set user-id root" programs
FTP & TFTP
The "r" commands
Electronic mail
ActiveX
Java
Trusted hosts
Inappropriate file permissions

7. How Networks Are Being Subverted


a)
b)
c)
d)
e)

Packet sniffers
IP spoofing
Denial of service
Dial-up connections
CGI & WWW vulnerabilities

8. Effective System Administration Policies


a) The KISS principle of security
b) Physical security
c) Backups

9. Firewalls and Information Security


a)
b)
c)
d)
e)
f)
g)
h)

Basic firewall concepts


Different architectural models for firewalls
Challenge-response systems & "smart cards"
COPS (Computer Oracle and Password System), Tripwire, etc.
"Sacrificial" machines
Crack, SATAN and other self-evaluation tools
Intrusion Detection
Demonstration of CA E-trust IDS and SCC

11. Ensuring Security for Electronic Commerce, Financial Networks, Intranets and Extranets
a)
b)
c)
d)

SSL, SSH, IPsec, Kerberos, PGP, and Virtual Private Networks


Intrusion Detection.
Firewalls.
Security Audits, Trip-wires and Honey Pots.

12. Combating Viruses


a)
b)
c)
d)
e)
f)

Practicing "safe computing"


Virus delivery systems
Disk viruses
Network viruses
Document or mail viruses
Virus elimination

13. Security Across Different Operating Systems and Platforms


a) Windows XP
b) Windows 95 and 98
c) Linux / UNIX

Assessment

También podría gustarte