Database Security for Cyber Professionals


Database Security for Cyber Professionals
MP4 | Video: AVC 1280x720 | Audio: AAC 44KHz 2ch | Duration: 3.5 Hours | Lec: 15 | 943 MB
Genre: eLearning | Language: English


Learn to Hack and Protect Relational Databases

Course Overview

In this course you will learn how to secure open source and commercial database platforms against modern threats and attack vectors.  This course includes a mix of conceptual lectures and detailed screencasts outlining all the steps involved with conducting test attacks and subsequently securing your database platforms.

Table of Contents

Lessons 1 – 4 -  Database Security Core - Here we will cover modern database security architectures, attack vectors and security threats.   You will learn how to design database defense in depth architectures utilizing a combination of preventive, corrective and detective controls.

Lesson 5 – Platform Hardening – Minimizing the attack surface area of operating systems, databases and applications is a key tenet of operational security.   Let’s talk about techniques for OS/DB and App hardening. 

Lesson 6 – MySQL Security Lab Build out – In this Lesson you will learn how to build your own MySQL Security Lab environment using Oracle VirtualBox.

Lesson 7 – My SQL Architecture and Exploits – After building out your MySQL Security Lab I will explain the MySQL Security Architecture and show you how to attack  MySQL Database installations. 

Lesson 8 – Locking Down MySQL – You will learn how to effectively secure MySQL Database installations using industry best practices and techniques.   

Lesson 9 – Oracle Exploitation and Security Best Practices – You will learn how to build an Oracle Database Security Lab environment as well as how to exploit and secure Oracle Databases from modern threats and attack vectors.  

Lesson 10 – PostgreSQL Architecture, Exploits and Hardening – You will learn PostgreSQL’s Security architecture and how to exploit and secure PostgreSQL Databases from modern threats and attack vectors. 

Lesson 11 – Storage Encryption - Storage Security has more moving parts than ever, especially considering the convergence of IP and Storage Networking technologies.   In this section we will talk about how to secure data at rest on Storage Area Networks, NAS and local systems. 

Lesson 12 – Key Management - Any encryption is only as good as the protection of its keys.   In this section you will learn about encryption key management procedures and best practices.

Lesson 13 -  Locking Down Big Data - Big Data is a broad term for data sets so large or complex that traditional data processing applications are inadequate. Big data is defined by significant data volume, variety and volume.   With the aggregation of these large data sets comes new security challenges.   In this lesson you will learn how to secure Big Data.  Linux Live Response - In this lesson you will learn how to statically compile forensic response tools in Linux to be used to conduct a live response of another Linux system.

 

Database Security for Cyber Professionals
Database_Security_for_Cyber_Professionals.part1.rar - 250.0 MB
Database_Security_for_Cyber_Professionals.part2.rar - 250.0 MB
Database_Security_for_Cyber_Professionals.part3.rar - 250.0 MB
Database_Security_for_Cyber_Professionals.part4.rar - 193.3 MB


 TO MAC USERS: If RAR password doesn't work, use this archive program: 

RAR Expander 0.8.5 Beta 4  and extract password protected files without error.


 TO WIN USERS: If RAR password doesn't work, use this archive program: 

Latest Winrar  and extract password protected files without error.


 nagy   |  

Information
Members of Guests cannot leave comments.


SermonBox - Seasonal Collection

SermonBox - The Series Pack Collection

Top Rated News

  • Christmas Material
  • Laser Cut & Print Design Elements Bundle - ETSY
  • Daz3D - All Materials - SKU 37000-37999
  • Cgaxis - All Product - 2019 - All Retail! - UPDATED!!!
  • DigitalXModels Full Collections
  • Rampant Design Tools Full Collections Total: $4400
  • FilmLooks.Com Full Collection
  • All PixelSquid Product
  • The Pixel Lab Collection
  • Envato Elements Full Sources- 3200+ Files
  • Ui8.NET Full Sources
  • The History of The 20th Century
  • The Dover Collections
  • Snake Interiors Collections
  • Inspirational Collections
  • Veer Fancy Collections
  • All Ojo Images
  • All ZZVE Collections
  • All Sozaijiten Collections
  • All Image Broker Collections
  • Shuterstock Bundle Collections
  • Tattoo Collections
  • Blend Images Collections
  • Authors Tuorism Collections
  • Motion Mile - Big Bundle
  • PhotoBacks - All Product - 2018
  • Dekes Techniques - Photoshop & Illustrator Course - 1 to 673
Telegram GFXTRA Group
Udemy - Turkce Gorsel Ogrenme Setleri - Part 2
Videohive Wow Pack Series


rss