YoVDO

Exploiting the Top Ten Database Vulnerabilities and Misconfigurations - BSidesRI 2013

Offered By: YouTube

Tags

Database Security Courses Cybersecurity Courses Penetration Testing Courses SQL Injection Courses Data Protection Courses

Course Description

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the top ten database vulnerabilities and misconfigurations in this conference talk from BSides Rhode Island 2013. Delve into practical exploitation techniques as Josh Sha demonstrates how to identify and exploit common database security flaws. Learn about critical database security issues, their potential impact, and gain insights into effective mitigation strategies. Enhance your understanding of database security and improve your ability to protect against common threats in this informative 48-minute presentation.

Syllabus

BsidesRI 2013 1 3 Exploiting the Top Ten Database Vulnerabilities and Misconfigurations Josh Sha


Related Courses

操作系统与虚拟化安全
Peking University via Coursera
Intro to Relational Databases
Udacity
SQL Server数据库技术
Xi'an Jiaotong University via Coursera
Provisioning Databases in Azure and SQL Server
Microsoft via edX
Databases in Azure
Microsoft via edX