
ratingsÂ
Securing Databases is an essential training course for DBAs and developers who need to produce secure database applications and manage secure databases. This course showcases demonstrations on how to repeatedly attack and then defend various assets associated with a fully functional database.
Unlimited Duration
March 11, 2021
Securing Databases course will help you to learn the skills required to recognize actual and potential database vulnerabilities, implement defenses for those vulnerabilities, and test those defenses for sufficiency. In this course you will learn about:
· Understand the consequences for not properly handling untrusted data such as denial of service, cross-site scripting, and injections
· Test databases with various attack techniques to determine the existence of and effectiveness of layered defenses
· Prevent and defend the many potential vulnerabilities associated with untrusted data
· Understand the concepts and terminology behind supporting, designing, and deploying secure databases
· Appreciate the magnitude of the problems associated with data security and the potential risks associated with those problems
· Understand the currently accepted best practices for supporting the many security needs of databases.
· Understand the vulnerabilities associated with authentication and authorization within the context of databases and database applications
· Detect, attack, and implement defenses for authentication and authorization functionality
· Understand the dangers and mechanisms behind Cross-Site Scripting (XSS) and Injection attacks
· Detect, attack, and implement defenses against XSS and Injection attacks
· Understand the concepts and terminology behind defensive, secure database configuration and operation
· Understand the use of Threat Modeling as a tool in identifying software vulnerabilities based on realistic threats against meaningful assets
· Perform both static reviews and dynamic database testing to uncover vulnerabilities
· Design and develop strong, robust authentication and authorization implementations
· Understand the fundamentals of Digital Signatures as well as how it can be used as part of the defensive infrastructure for data
Understand the fundamentals of Encryption as well as how it can be used as part of the defensive infrastructure for data
Course Curriculum
-
- Why Hunt for Security Defects? 00:00:00
- Fingerprinting Databases 00:00:00
- Principles of Information Security 00:00:00
-
- Database Security Concerns 00:00:00
- Vulnerabilities 00:00:00
- Cryptography Overview 00:00:00
- Database Security 00:00:00
- What Next? 00:00:00
- Asset Analysis 00:00:00
- Design Review 00:00:00
- Making Application Security Real 00:00:00
Course Reviews

Students