Securing SQL Server Applications/01. Course Overview/01. Course Overview.mp4 |
3.1 MB |
Securing SQL Server Applications/01. Course Overview/01. Course Overview.srt |
2 KB |
Securing SQL Server Applications/02. Introduction to Advanced Security Topics/01. SQL Server Security Overview.mp4 |
9.7 MB |
Securing SQL Server Applications/02. Introduction to Advanced Security Topics/01. SQL Server Security Overview.srt |
11 KB |
Securing SQL Server Applications/02. Introduction to Advanced Security Topics/02. Understanding the Significance of Securing Application Data.mp4 |
3.6 MB |
Securing SQL Server Applications/02. Introduction to Advanced Security Topics/02. Understanding the Significance of Securing Application Data.srt |
5 KB |
Securing SQL Server Applications/02. Introduction to Advanced Security Topics/03. Recognizing Security Threats and Vulnerabilities.mp4 |
5 MB |
Securing SQL Server Applications/02. Introduction to Advanced Security Topics/03. Recognizing Security Threats and Vulnerabilities.srt |
6 KB |
Securing SQL Server Applications/02. Introduction to Advanced Security Topics/04. Security Best Practices for Applications Accessing SQL Server.mp4 |
3.3 MB |
Securing SQL Server Applications/02. Introduction to Advanced Security Topics/04. Security Best Practices for Applications Accessing SQL Server.srt |
3 KB |
Securing SQL Server Applications/02. Introduction to Advanced Security Topics/05. Using SSL with Client Connections.mp4 |
11.6 MB |
Securing SQL Server Applications/02. Introduction to Advanced Security Topics/05. Using SSL with Client Connections.srt |
8 KB |
Securing SQL Server Applications/03. Auditing/01. Purpose and Advantages of Auditing and Logging.mp4 |
15.8 MB |
Securing SQL Server Applications/03. Auditing/01. Purpose and Advantages of Auditing and Logging.srt |
10 KB |
Securing SQL Server Applications/03. Auditing/02. Setting up SQL Server Auditing at the Instance Level.mp4 |
21 MB |
Securing SQL Server Applications/03. Auditing/02. Setting up SQL Server Auditing at the Instance Level.srt |
13 KB |
Securing SQL Server Applications/03. Auditing/03. Setting up SQL Server Auditing in a Database.mp4 |
8.3 MB |
Securing SQL Server Applications/03. Auditing/03. Setting up SQL Server Auditing in a Database.srt |
4 KB |
Securing SQL Server Applications/03. Auditing/04. Reading and Interpreting Audit Logs.mp4 |
17.3 MB |
Securing SQL Server Applications/03. Auditing/04. Reading and Interpreting Audit Logs.srt |
8 KB |
Securing SQL Server Applications/04. Encryption in SQL Server/01. Understanding Encryption for Data Security.mp4 |
4 MB |
Securing SQL Server Applications/04. Encryption in SQL Server/01. Understanding Encryption for Data Security.srt |
5 KB |
Securing SQL Server Applications/04. Encryption in SQL Server/02. Using Hash Functions for Password Storage.mp4 |
8.1 MB |
Securing SQL Server Applications/04. Encryption in SQL Server/02. Using Hash Functions for Password Storage.srt |
7 KB |
Securing SQL Server Applications/04. Encryption in SQL Server/03. Encrypting Data in SQL Server.mp4 |
13.3 MB |
Securing SQL Server Applications/04. Encryption in SQL Server/03. Encrypting Data in SQL Server.srt |
10 KB |
Securing SQL Server Applications/04. Encryption in SQL Server/04. Encrypting Column Data.mp4 |
9.7 MB |
Securing SQL Server Applications/04. Encryption in SQL Server/04. Encrypting Column Data.srt |
8 KB |
Securing SQL Server Applications/04. Encryption in SQL Server/05. Encrypting Data at Rest.mp4 |
10.6 MB |
Securing SQL Server Applications/04. Encryption in SQL Server/05. Encrypting Data at Rest.srt |
10 KB |
Securing SQL Server Applications/04. Encryption in SQL Server/06. Using Always Encrypted.mp4 |
17 MB |
Securing SQL Server Applications/04. Encryption in SQL Server/06. Using Always Encrypted.srt |
13 KB |
Securing SQL Server Applications/04. Encryption in SQL Server/07. Setting up Always Encrypted with Secure Enclaves.mp4 |
11.9 MB |
Securing SQL Server Applications/04. Encryption in SQL Server/07. Setting up Always Encrypted with Secure Enclaves.srt |
8 KB |
Securing SQL Server Applications/05. Fighting SQL Injection Attacks/01. Understanding SQL Injections.mp4 |
7.3 MB |
Securing SQL Server Applications/05. Fighting SQL Injection Attacks/01. Understanding SQL Injections.srt |
6 KB |
Securing SQL Server Applications/05. Fighting SQL Injection Attacks/02. Real World Injection Threats.mp4 |
7.6 MB |
Securing SQL Server Applications/05. Fighting SQL Injection Attacks/02. Real World Injection Threats.srt |
5 KB |
Securing SQL Server Applications/05. Fighting SQL Injection Attacks/03. Protecting T-SQL Code Against Injections.mp4 |
6.2 MB |
Securing SQL Server Applications/05. Fighting SQL Injection Attacks/03. Protecting T-SQL Code Against Injections.srt |
4 KB |
Securing SQL Server Applications/05. Fighting SQL Injection Attacks/04. Using Properly Stored Procedures and Dynamic SQL.mp4 |
9 MB |
Securing SQL Server Applications/05. Fighting SQL Injection Attacks/04. Using Properly Stored Procedures and Dynamic SQL.srt |
8 KB |
Securing SQL Server Applications/06. Tools for Compliance Regulations/01. Introduction to Compliance Regulations.mp4 |
2.7 MB |
Securing SQL Server Applications/06. Tools for Compliance Regulations/01. Introduction to Compliance Regulations.srt |
3 KB |
Securing SQL Server Applications/06. Tools for Compliance Regulations/02. Masking Sensitive Data Using Dynamic Data Masking.mp4 |
7.4 MB |
Securing SQL Server Applications/06. Tools for Compliance Regulations/02. Masking Sensitive Data Using Dynamic Data Masking.srt |
5 KB |
Securing SQL Server Applications/06. Tools for Compliance Regulations/03. Keeping History Using Temporal Tables.mp4 |
12.8 MB |
Securing SQL Server Applications/06. Tools for Compliance Regulations/03. Keeping History Using Temporal Tables.srt |
10 KB |
Securing SQL Server Applications/06. Tools for Compliance Regulations/04. Introduction to Database Ledger.mp4 |
2.5 MB |
Securing SQL Server Applications/06. Tools for Compliance Regulations/04. Introduction to Database Ledger.srt |
3 KB |
Securing SQL Server Applications/06. Tools for Compliance Regulations/05. Using SQL Server Ledger.mp4 |
10.5 MB |
Securing SQL Server Applications/06. Tools for Compliance Regulations/05. Using SQL Server Ledger.srt |
8 KB |
Securing SQL Server Applications/sql-server-securing-applications.zip |
16.3 MB |