FileMood

Download Security and Encryption in SQL Server 2012 and 2014

Security and Encryption in SQL Server 2012 and 2014

Name

Security and Encryption in SQL Server 2012 and 2014

 DOWNLOAD Copy Link

Total Size

1.4 GB

Total Files

69

Hash

DBFD8A05C4800EAF6F0323F627FF054C9CA58905

/05. Roles and Permissions/

05_05-Demo Fixed Server Roles.mp4

67.3 MB

05_07-Demo User-defined Server Roles.mp4

51.4 MB

05_06-Demo Server Permissions.mp4

47.0 MB

05_08-Demo Setting Permissions.mp4

46.3 MB

05_11-Demo Mapping Windows Groups to Database Users.mp4

28.4 MB

05_03-What are Securables and How to Assign Permissions.mp4

7.5 MB

05_12-Summary.mp4

4.7 MB

05_09-System Database Users.mp4

4.1 MB

05_02-Principals, Roles, Owners, ....mp4

4.1 MB

05_04-Fixed Server Roles.mp4

3.5 MB

05_10-Database Roles.mp4

3.4 MB

05_01-Introduction, Permissions.mp4

2.5 MB

/02. Server and System Security/

02_02-Other System Accounts.mp4

58.9 MB

02_05-Opening Ports on Windows Firewall by Script.mp4

58.3 MB

02_06-Enabling TCP on an Instance by Script.mp4

50.1 MB

02_09-Encrypting the Connection Between Client and Server Using SSL.mp4

45.9 MB

02_08-Fixing a TCP Port for an Instance.mp4

38.9 MB

02_01-Module Introduction and System Account.mp4

23.3 MB

02_03-Surface Area Configuration.mp4

21.3 MB

02_07-Hiding an Instance in SQL Server Browser.mp4

16.5 MB

02_04-Opening Ports on Windows Firewall With the GUI.mp4

8.4 MB

02_10-Using Extended Protection Against Authentication Relay Attacks.mp4

6.1 MB

02_11-Conclusion.mp4

4.1 MB

/06. Fighting SQL Injections/

06_06-Demo Using SQLMap to Perform Injection Against our Server.mp4

55.2 MB

06_05-Installing and Using SQLMap.mp4

45.8 MB

06_02-Demo Basic SQL Injection Techniques.mp4

36.5 MB

06_07-How to Prevent Injection.mp4

28.0 MB

06_08-Detecting Common Injection Patterns.mp4

25.4 MB

06_09-Demo Avoiding Dynamic SQL.mp4

25.0 MB

06_03-The Different Types of Injections.mp4

18.9 MB

06_10-Ownership Chaining.mp4

17.1 MB

06_01-Introduction, What are SQL Injections.mp4

6.5 MB

06_04-Some SQL Injection Tools.mp4

2.2 MB

/07. Encryption/

07_09-Demo Using Certificates.mp4

54.9 MB

07_10-Demo Encrypting Data With Authenticators.mp4

45.5 MB

07_07-Demo Encrypting Data Using a Symmetric Key.mp4

38.1 MB

07_04-Demo Database Master Key.mp4

25.7 MB

07_05-Transparent Data Encryption.mp4

22.3 MB

07_02-Encryption Keys Symmetric and Asymmetric Encryption.mp4

14.9 MB

07_06-Demo Encrypted Backup in SQL Server 2014.mp4

14.3 MB

07_08-Demo Using Asymmetric Keys.mp4

14.2 MB

07_03-Service and Database Master Keys.mp4

13.9 MB

07_11-Non-reversible Encryption With Hashing.mp4

12.5 MB

07_12-Summary.mp4

4.4 MB

07_01-Introduction.mp4

1.1 MB

/03. Penetration Testing/

03_03-Cracking the SA Password.mp4

51.6 MB

03_04-Extracting Information From SQL Server Using Metasploit.mp4

26.2 MB

03_02-Using Metasploit to Discover SQL Server Instance.mp4

16.5 MB

03_05-Summary.mp4

4.6 MB

03_01-Introduction.mp4

3.4 MB

/04. Authentication and Logins/

04_06-Demo Creating Logins.mp4

27.3 MB

04_04-Demo Principals.mp4

25.3 MB

04_05-Demo Using SIDs.mp4

21.5 MB

04_07-Demo Password Policies.mp4

14.3 MB

04_02-Demo Login Modes.mp4

13.5 MB

04_08-Demo Enabling and Disabling Logins and Users.mp4

11.0 MB

04_09-Demo Changing and Disabling sa.mp4

6.2 MB

04_01-Introduction.mp4

5.8 MB

04_10-Conclusion.mp4

5.2 MB

04_03-Authentication and Permission Model.mp4

4.1 MB

/01. Introduction to Security With SQL Server/

01_08-Demo Client Connections.mp4

13.7 MB

01_04-Demo Stealing Database Files.mp4

10.9 MB

01_05-There are More Risks Than Data Access.mp4

9.6 MB

01_06-What Tools do we Need.mp4

4.4 MB

01_02-Why do we Need Security.mp4

4.1 MB

01_03-What do we Need to Secure.mp4

4.0 MB

01_07-How Clients are Connecting to SQL Server.mp4

3.6 MB

01_01-Course Introduction.mp4

3.3 MB

01_09-Summary.mp4

3.3 MB

 

Total files 69


Copyright © 2024 FileMood.com