Impetus is dedicated to provide unique,
pragmatic and innovative career solutions

Database Security

This course teaches the principles and practices of implementing computer database security in modern businesses and industries, including database security principles, database auditing, security implementation and database reliability.

Prerequisites : Programmers with experience in C, C#, C++, Java, PHP, ASP, .NET and SQL

Course Goals and Learning Objectives

Students will learn to

  • Demonstrate understanding of current database technology and typical database products.
  • Demonstrate understanding of security architecture in modern computer systems in a typical enterprise.
  • Formulate a working definition of database security and administration.
  • Identify contemporary practices of operating system security.
  • Demonstrate the knowledge and skills for administration of user, profiles, password policies, privileges and roles.
  • Manage database security on application level.
  • Conduct database auditing for security and reliability.
  • Implement typical security projects on enterprise systems.

Secure System Administration

This course teaches the principles and practices of securing systems against attack and misuse. The focus will be on the MS Windows (server and workstation), Linux (server and workstation) and Mac OS (workstation) platform, with a very basic coverage of the mobile platforms. We will cover threat models, attacks that compromise security, and techniques for achieving security, based on recent research papers. Topics include operating system (OS) security, capabilities, information flow control, language security, network protocols, hardware security, and security in web applications.

Prerequisites: Windows/Linux basic system administration

Course Goals and Learning Objectives

Students will learn to

  • Develop an understanding of information assurance as practiced in computer operating systems, distributed systems, networks and representative applications.
  • Gain familiarity with prevalent network and distributed system attacks, defenses against them, and forensics to investigate the aftermath.
  • Develop a basic understanding of cryptography, how it has evolved, and some key encryption techniques used today.
  • Develop an understanding of security policies (such as authentication, integrity and confidentiality), as well as protocols to implement such policies in the form of message exchanges.


  • Office Manager Package

    This course gives hands on knowledge of the office management cycle including book keeping, accounting...

    › read more
  • Business Accounting / Book Keeping

    This course gives hands on knowledge of the accounting cycle including recording and analyzing accounting...

    › read more
  • Business Office Admin Specialist

    This Program prepares the participants users for basic administrative jobs in all fields of Office Admin and Data entry ...

    › read more
  • Project Management Professional ( PMP)

    This course gives hands on knowledge of the project management cycle from analyzing business structure ...

    › read more
  • Certified Clinical Medical Assistant

    A medical assistant performs routine administrative and clinical duties in medical offices ...

    › read more
  • Certified Medical Administrative Assistant

    Medical administrative assistants are responsible for a wide range of secretarial tasks to ensure the office...

    › read more
  • Certified Medical Coder ( ICD-10)

    ICD – 10 is a medical classification list by the World Health Organization which codes for diseases, signs, symptoms...

    › read more
  • Electronic Medical Records Specialist

    An electronic health records specialist is responsible for protecting the privacy and security of patient information....

    › read more
  • Certified Phlebotomy Technician

    A phlebotomy technician is responsible for drawing blood from patients and preparing it for further testing. This course...

    › read more
  • EKG Technician

    An EKG technician is responsible for monitoring and recording electical impulses transmitted by the heart...

    › read more
  • Web Development

    • Web pages design
    • Web development
    • Portal integration...
    › read more
  • Cyber Security (IT Security Management)

    Understand and think like the attacker – the methods and tools they will use to attack the application being designed...

    › read more