10 Deadly Sins of SQL Server Configuration
Offered By: OWASP Foundation via YouTube
Course Description
Overview
Explore the critical vulnerabilities in SQL Server configurations through this informative conference talk from OWASP AppSec California 2015. Delve into 10 common weak setups that hackers exploit to gain unauthorized access to data, applications, and systems. Witness practical demonstrations of real-world attack techniques used in penetration testing. Gain valuable insights for developers, new database administrators, and aspiring penetration testers on the risks associated with inadequate SQL Server configurations. Learn from Scott Sutherland, a principal security consultant at NetSPI, as he shares his expertise in database security, penetration testing, and information security research.
Syllabus
10 Deadly Sins of SQL Server Configuration - Scott Sutherland - OWASP AppSec California 2015
Taught by
OWASP Foundation
Related Courses
操作系统与虚拟化安全Peking University via Coursera Intro to Relational Databases
Udacity SQL Server数据库技术
Xi'an Jiaotong University via Coursera Provisioning Databases in Azure and SQL Server
Microsoft via edX Databases in Azure
Microsoft via edX