• Close
  • Training
    • CMD+CTRL Base Camp
    • Courses
      • Overview
      • Features
      • Learning Paths
      • Course Catalog
      • Customer Success
      • Try it
    • Labs
    • Cyber Range
      • Overview
      • Features
      • Reporting
      • Suite
      • Modes
      • Customer Success
      • Get Started
    • ✓ Take the AppSec Challenge
  • Services
    • Overview
    • Software Penetration Testing
      • Pen testing Overview
      • IoT Pen Testing
      • Mobile Pen Testing
      • Cloud & Web Penetration Testing
      • Blockchain Pen Testing
      • Our Difference
    • Application Security Consulting
      • Secure SDLC (SSDLC) Consulting
      • Application Security Code Review
      • Architecture & Design Review
      • Medical Device Threat Modeling
    • Infrastructure Security Consulting
      • Attack Simulation
      • Cloud Security Configuration
      • Security Tabletop Consulting
  • Solutions
    • Cloud & Web
    • Mobile
    • IoT & Embedded
    • Blockchain
  • Resources
    • Guides & Case Studies
    • Webinars
  • Blog
  • About
    • Company Overview
    • Ed TALKS
    • Partners
    • Community
    • Clients
    • Leadership
    • Careers
    • News
    • Contact
  • Let’s Talk
  •  
Security Innovation
  • Training
    • CMD+CTRL Base Camp
    • Courses
      • Overview
      • Features
      • Learning Paths
      • Course Catalog
      • Customer Success
      • Try it
    • Labs
    • Cyber Range
      • Overview
      • Features
      • Reporting
      • Suite
      • Modes
      • Customer Success
      • Get Started
    • ✓ Take the AppSec Challenge
  • Services
    • Overview
    • Software Penetration Testing
      • Pen testing Overview
      • IoT Pen Testing
      • Mobile Pen Testing
      • Cloud & Web Penetration Testing
      • Blockchain Pen Testing
      • Our Difference
    • Application Security Consulting
      • Secure SDLC (SSDLC) Consulting
      • Application Security Code Review
      • Architecture & Design Review
      • Medical Device Threat Modeling
    • Infrastructure Security Consulting
      • Attack Simulation
      • Cloud Security Configuration
      • Security Tabletop Consulting
  • Solutions
    • Cloud & Web
    • Mobile
    • IoT & Embedded
    • Blockchain
  • Resources
    • Guides & Case Studies
    • Webinars
  • Blog
  • About
    • Company Overview
    • Ed TALKS
    • Partners
    • Community
    • Clients
    • Leadership
    • Careers
    • News
    • Contact
  • Let’s Talk
  •  

Course Catalog / NICE Specialty Areas / Data Administration (DTA)

Data Administration (DTA)

Develops and administers databases and/or data management systems that allow for the storage, query, protection, and utilization of data.


The Courses

View All Courses     Download Course Catalog

DES 209 Authentication and Lifecycle Management (COMING SOON)


15 Minutes
Advanced

DES 239 Mitigating OWASP 2021 Software and Data Integrity Failures (NEW)


12 Minutes
Advanced

DES 234 – Mitigating OWASP 2021 Cryptographic Failures (NEW)


12 Minutes
Advanced

DES 216 – Protecting Cloud Infrastructure


40 Minutes
Advanced

DES 218 – Protecting Microservices, Containers, and Orchestration


30 Minutes
Advanced

COD 141 – Fundamentals of Database Security


30 Minutes
Core

Security Innovation

  • Training
  • Services
  • Solutions
  • Resources
  • Blog
  • About
  • Let’s Talk

Offices

Headquarters - Boston, MA
187 Ballardvale Street, Suite A195
Wilmington, MA 01887

Phone: +1.877.839.7598
Sales: 1.877.839.7598 x1
Support: 1.877.839.7598 x2
Email: Support
Email: PR

Pune, India
516 World Trade Center - Tower 2
Kharadi, Pune, MH 411014
Phone: +91 820 840 1411
Email: India Sales

Seattle, WA
1511 3rd Ave #808
Seattle, WA 98101

Copyright © 2022 Security Innovation, Inc. All Rights Reserved Privacy Policy