YoVDO

10 Deadly Sins of SQL Server Configuration

Offered By: OWASP Foundation via YouTube

Tags

Database Security Courses Cybersecurity Courses Penetration Testing Courses Database Administration Courses Configuration Management Courses Vulnerability Assessment Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the critical vulnerabilities in SQL Server configurations through this informative conference talk from OWASP AppSec California 2015. Delve into 10 common weak setups that hackers exploit to gain unauthorized access to data, applications, and systems. Witness practical demonstrations of real-world attack techniques used in penetration testing. Gain valuable insights for developers, new database administrators, and aspiring penetration testers on the risks associated with inadequate SQL Server configurations. Learn from Scott Sutherland, a principal security consultant at NetSPI, as he shares his expertise in database security, penetration testing, and information security research.

Syllabus

10 Deadly Sins of SQL Server Configuration - Scott Sutherland - OWASP AppSec California 2015


Taught by

OWASP Foundation

Related Courses

操作系统与虚拟化安全
Peking University via Coursera
Intro to Relational Databases
Udacity
SQL Server数据库技术
Xi'an Jiaotong University via Coursera
Provisioning Databases in Azure and SQL Server
Microsoft via edX
Databases in Azure
Microsoft via edX