DATA IS THE OIL OF THE 21ST CENTURY – ANALYTICS IS THE ENGINE
"Data is the new oil. Like oil, data is valuable, but if unrefined it cannot really be used. It has to be changed into gas, plastic, chemicals, etc. to create a valuable entity that drives profitable activity. So, must data be harnessed, analyzed for it to have value?"
Imagine it's the first day of class in college, and you sit down for the first lecture. The professor walks in and makes an announcement:
'Welcome back after the summer everyone. I have to start with some bad news. Due to a glitch in the school's database, all grades and credits from last semester have been lost. I'm sorry, but we are going to have to do last semester all over again. Now open your book on page…'
Disastrous, right? Could you imagine? How could the school lose all that information? Luckily, these things rarely happen. The question is: How can we prevent this from happening? Who is responsible for keeping all the data accessible and secure in an organization? That would be the Database administrator (DBA) or Database Engineer (DBE). The typical tasks of a DBA include:
- Controlling access to the database, including creating logins for users and setting roles for group users. Some users may only need to query the data, while others are involved in entering new data.
- Managing procedures for backup, restore and recovery of data, in case of errors made by users or system crashes. You don't want to lose all the valuable data just because the power went out or a disk drive crashed.
- Providing support services to the end users, such as making sure all users know how to access and use the database.
- Ensuring data integrity, which means that data are complete, accurate and current for the tasks at hand.
- Controlling data security, including preventing unauthorized access to the data and protecting against other security threats.
- Setting data privacy, which means that only authorized individuals are able to see certain data. For example, there is no need for everyone in the organization to be able to see all the personnel files of all the employees.
Different Levels of Protecting a Database
Do the company’s business critical applications rely on data stored in different locations and accessed via different services? For example, Amazon S3, ON-PREMISES Block or Object storage drives? Is that data fully protected from ransomware, accidental deletions, and bad actors? Security pasture needs to be enhanced to provide full data protection. Database protection has different levels to it. Below are some of the areas for protecting a database:
- Data-Level Security: The process of securing data from getting tampered with or stolen from the server.
- User-Level Security: When they attack a server, they do so from the Operating System (OS) level. This is why organizations look towards real-time protection software for monitoring transactions and restricting users from visiting unauthorized websites or downloading from untrusted sources.
- System-Level Security: To protect network servers, hardware, and other outbound/inbound communications from working as the channel for distributing malicious software.
Roles of the Database Management System
A Database Management System (DBMS) provides many roles for managing and controlling the Database. Among the roles provided by the DBMS are:
1. Facilitates easy management of data since data of the same category are always stored together. The DBMS facilitates data security, through the access control provided to individual on which data can, and should be accessed by which group. Example Managerial data in the bank should be accessed by Bank Managers, Customers Account Information should be accessed by Customers and Bank Accountants, IT information should be accessed by Information Technologist Personnel.
2. The DBMS minimizes data inconsistence. In databases, data inconsistencies are removed by the use of primary key; the primary key enables data to be recorded once without being duplicated several times in the database tables.
Several of these tasks go hand-in-hand. For example, carefully controlling access to the data helps to implement data security and data privacy policies. This program prepares students to become DBAs or DBEs or Database Security Experts. DBAs/DBEs/ Database Security Experts are responsible for the design, implementation, support, and maintenance of computerized databases in today’s organizations. The role also includes architecting, building and scaling databases for future data growth and capacity. They are also responsible for security, performance, and availability of data to users and customers.
- Week 1 – Intro to Computers: The compute resources, e.g., CPU and storage (memory and hard drive)
- Week 2 to 5: Basic and Intermediate Level of LINUX for the DBA/DBE/Data Security Specialist
- Prepare servers (physical, Virtual Machines and/or Containers) and install Oracle and PostgreSQL database software applications, create listeners and databases, apply Quarterly Patches etc.
- Manually Starting & Stopping Database Services
- Exploring the Oracle Database Architecture: Memory Instance Processes and Database
- Automating Database Startups and shutdowns upon server shutdown and startup
- Manage DB Storage Structures: Tablespaces, Data Files & Temp Files
- Configuring and Managing Undo Data
- Networking with databases: Oracle Net Services – listener and TN Names Files
- Database Security Implementation:
- Administering User Security, Privileges and Roles, Profiles and Auditing, Data Masking and Data Encryption
- Moving Data: SQL Loader, Export & Import
- Database Maintenance & Performance Monitoring
- Backup & Recovery Concepts, Configuration & implementation
- Resource Manager & Scheduler – CRON and DBMS Scheduler
|Saturday Session||Mon & Wed Session|
|DURATION||22 Weeks total||22 Weeks total|
|DELIVERY||In-person and/or Virtual (Remote)||In-person and/or Virtual (Remote)|
|TIME||10:00–12:15 & 1:00–3:15PM||7:00PM – 9:15PM|
|START DATE||January 22nd, 2022||January 24th, 2022|
|END DATE||June 18th, 2022||June 22nd, 2022|
Prospective students are advised to schedule a consultation with one of our qualified advisors. At that time the advisor will explain the program in detail and provide a tour of the school’s facilities if the student is available.
Registration and Enrollment
Registration is on a first come basis, and early registration is strongly recommended. Chaveran Institute of Technology (CIT) Inc., enrolls only 14 students in a class.