10 Deadly Sins of SQL Server Configuration
Offered By: OWASP Foundation via YouTube
Course Description
Overview
Explore the critical vulnerabilities in SQL Server configurations through this informative conference talk from OWASP AppSec California 2015. Delve into 10 common weak setups that hackers exploit to gain unauthorized access to data, applications, and systems. Witness practical demonstrations of real-world attack techniques used in penetration testing. Gain valuable insights for developers, new database administrators, and aspiring penetration testers on the risks associated with inadequate SQL Server configurations. Learn from Scott Sutherland, a principal security consultant at NetSPI, as he shares his expertise in database security, penetration testing, and information security research.
Syllabus
10 Deadly Sins of SQL Server Configuration - Scott Sutherland - OWASP AppSec California 2015
Taught by
OWASP Foundation
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network