资源详情

返回首页 | 相关搜索
Security and Encryption in SQL Server 2012 and 2014
大小 1.32 GB
文件数 69
Info Hash: DBFD8A05C4800EAF6F0323F627FF054C9CA58905
收录时间 2025-12-14 21:37:09
更新时间 2025-12-15 05:23:03
文件列表 (69)
05. Roles and Permissions/05_05-Demo Fixed Server Roles.mp4
64.19 MB
02. Server and System Security/02_02-Other System Accounts.mp4
56.13 MB
02. Server and System Security/02_05-Opening Ports on Windows Firewall by Script.mp4
55.59 MB
06. Fighting SQL Injections/06_06-Demo Using SQLMap to Perform Injection Against our Server.mp4
52.6 MB
07. Encryption/07_09-Demo Using Certificates.mp4
52.38 MB
03. Penetration Testing/03_03-Cracking the SA Password.mp4
49.25 MB
05. Roles and Permissions/05_07-Demo User-defined Server Roles.mp4
48.99 MB
02. Server and System Security/02_06-Enabling TCP on an Instance by Script.mp4
47.74 MB
05. Roles and Permissions/05_06-Demo Server Permissions.mp4
44.86 MB
05. Roles and Permissions/05_08-Demo Setting Permissions.mp4
44.13 MB
02. Server and System Security/02_09-Encrypting the Connection Between Client and Server Using SSL.mp4
43.78 MB
06. Fighting SQL Injections/06_05-Installing and Using SQLMap.mp4
43.67 MB
07. Encryption/07_10-Demo Encrypting Data With Authenticators.mp4
43.4 MB
02. Server and System Security/02_08-Fixing a TCP Port for an Instance.mp4
37.1 MB
07. Encryption/07_07-Demo Encrypting Data Using a Symmetric Key.mp4
36.33 MB
06. Fighting SQL Injections/06_02-Demo Basic SQL Injection Techniques.mp4
34.84 MB
05. Roles and Permissions/05_11-Demo Mapping Windows Groups to Database Users.mp4
27.04 MB
06. Fighting SQL Injections/06_07-How to Prevent Injection.mp4
26.72 MB
04. Authentication and Logins/04_06-Demo Creating Logins.mp4
26.05 MB
03. Penetration Testing/03_04-Extracting Information From SQL Server Using Metasploit.mp4
25.03 MB
07. Encryption/07_04-Demo Database Master Key.mp4
24.55 MB
06. Fighting SQL Injections/06_08-Detecting Common Injection Patterns.mp4
24.18 MB
04. Authentication and Logins/04_04-Demo Principals.mp4
24.17 MB
06. Fighting SQL Injections/06_09-Demo Avoiding Dynamic SQL.mp4
23.88 MB
02. Server and System Security/02_01-Module Introduction and System Account.mp4
22.23 MB
07. Encryption/07_05-Transparent Data Encryption.mp4
21.28 MB
04. Authentication and Logins/04_05-Demo Using SIDs.mp4
20.5 MB
02. Server and System Security/02_03-Surface Area Configuration.mp4
20.27 MB
06. Fighting SQL Injections/06_03-The Different Types of Injections.mp4
18.01 MB
06. Fighting SQL Injections/06_10-Ownership Chaining.mp4
16.32 MB
02. Server and System Security/02_07-Hiding an Instance in SQL Server Browser.mp4
15.74 MB
03. Penetration Testing/03_02-Using Metasploit to Discover SQL Server Instance.mp4
15.72 MB
07. Encryption/07_02-Encryption Keys Symmetric and Asymmetric Encryption.mp4
14.17 MB
07. Encryption/07_06-Demo Encrypted Backup in SQL Server 2014.mp4
13.68 MB
04. Authentication and Logins/04_07-Demo Password Policies.mp4
13.65 MB
07. Encryption/07_08-Demo Using Asymmetric Keys.mp4
13.54 MB
07. Encryption/07_03-Service and Database Master Keys.mp4
13.29 MB
01. Introduction to Security With SQL Server/01_08-Demo Client Connections.mp4
13.02 MB
04. Authentication and Logins/04_02-Demo Login Modes.mp4
12.83 MB
07. Encryption/07_11-Non-reversible Encryption With Hashing.mp4
11.93 MB
04. Authentication and Logins/04_08-Demo Enabling and Disabling Logins and Users.mp4
10.46 MB
01. Introduction to Security With SQL Server/01_04-Demo Stealing Database Files.mp4
10.37 MB
01. Introduction to Security With SQL Server/01_05-There are More Risks Than Data Access.mp4
9.15 MB
02. Server and System Security/02_04-Opening Ports on Windows Firewall With the GUI.mp4
8.01 MB
05. Roles and Permissions/05_03-What are Securables and How to Assign Permissions.mp4
7.13 MB
06. Fighting SQL Injections/06_01-Introduction, What are SQL Injections.mp4
6.19 MB
04. Authentication and Logins/04_09-Demo Changing and Disabling sa.mp4
5.93 MB
02. Server and System Security/02_10-Using Extended Protection Against Authentication Relay Attacks.mp4
5.8 MB
04. Authentication and Logins/04_01-Introduction.mp4
5.57 MB
04. Authentication and Logins/04_10-Conclusion.mp4
4.94 MB
05. Roles and Permissions/05_12-Summary.mp4
4.51 MB
03. Penetration Testing/03_05-Summary.mp4
4.35 MB
07. Encryption/07_12-Summary.mp4
4.23 MB
01. Introduction to Security With SQL Server/01_06-What Tools do we Need.mp4
4.15 MB
05. Roles and Permissions/05_09-System Database Users.mp4
3.91 MB
01. Introduction to Security With SQL Server/01_02-Why do we Need Security.mp4
3.91 MB
04. Authentication and Logins/04_03-Authentication and Permission Model.mp4
3.89 MB
02. Server and System Security/02_11-Conclusion.mp4
3.89 MB
05. Roles and Permissions/05_02-Principals, Roles, Owners, ....mp4
3.86 MB
01. Introduction to Security With SQL Server/01_03-What do we Need to Secure.mp4
3.83 MB
01. Introduction to Security With SQL Server/01_07-How Clients are Connecting to SQL Server.mp4
3.39 MB
05. Roles and Permissions/05_04-Fixed Server Roles.mp4
3.36 MB
03. Penetration Testing/03_01-Introduction.mp4
3.27 MB
05. Roles and Permissions/05_10-Database Roles.mp4
3.2 MB
01. Introduction to Security With SQL Server/01_01-Course Introduction.mp4
3.19 MB
01. Introduction to Security With SQL Server/01_09-Summary.mp4
3.17 MB
05. Roles and Permissions/05_01-Introduction, Permissions.mp4
2.37 MB
06. Fighting SQL Injections/06_04-Some SQL Injection Tools.mp4
2.05 MB
07. Encryption/07_01-Introduction.mp4
1.04 MB

免责声明

本网站仅提供DHT网络资源索引服务,不存储任何资源文件。所有资源均来自DHT网络,本站无法控制其内容。请遵守当地法律法规,合理使用网络资源。如涉及版权问题,请联系 fuckatgfw@protonmail.com。