The development of secure data systems

 Identify best practices about the development of secure data systems and
modern threats to database security.
 Explain the importance of ensuring security in the entire SDLC methodology
and use a secure approach to development of a database management
system.
 Identify and explain zero-day threats and compare and contrast zero-day
threats and known threats.
 Identify insider threats, explain mitigation methods for alleviating insider and
zero-day threats, and explain what an incident response team does and
needs.