10 Deadly Sins of SQL Server Configuration
Offered By: OWASP Foundation via YouTube
Course Description
Overview
Explore the critical vulnerabilities in SQL Server configurations through this informative conference talk from OWASP AppSec California 2015. Delve into 10 common weak setups that hackers exploit to gain unauthorized access to data, applications, and systems. Witness practical demonstrations of real-world attack techniques used in penetration testing. Gain valuable insights for developers, new database administrators, and aspiring penetration testers on the risks associated with inadequate SQL Server configurations. Learn from Scott Sutherland, a principal security consultant at NetSPI, as he shares his expertise in database security, penetration testing, and information security research.
Syllabus
10 Deadly Sins of SQL Server Configuration - Scott Sutherland - OWASP AppSec California 2015
Taught by
OWASP Foundation
Related Courses
MongoDB for DBAsMongoDB University MongoDB Advanced Deployment and Operations
MongoDB University 内存数据库管理
openHPI Data Cleansing with Data Quality Services (DQS)
Microsoft via edX Recovering Data in Azure and SQL Server
Microsoft via edX