BITCQ

Security and Encryption in SQL Server 2012 and 2014

Size: 1.3 GB
Magnet link

Name Size
Security and Encryption in SQL Server 2012 and 2014/05. Roles and Permissions/05_05-Demo Fixed Server Roles.mp4 64.2 MB
Security and Encryption in SQL Server 2012 and 2014/02. Server and System Security/02_02-Other System Accounts.mp4 56.1 MB
Security and Encryption in SQL Server 2012 and 2014/02. Server and System Security/02_05-Opening Ports on Windows Firewall by Script.mp4 55.6 MB
Security and Encryption in SQL Server 2012 and 2014/06. Fighting SQL Injections/06_06-Demo Using SQLMap to Perform Injection Against our Server.mp4 52.6 MB
Security and Encryption in SQL Server 2012 and 2014/07. Encryption/07_09-Demo Using Certificates.mp4 52.4 MB
Security and Encryption in SQL Server 2012 and 2014/03. Penetration Testing/03_03-Cracking the SA Password.mp4 49.2 MB
Security and Encryption in SQL Server 2012 and 2014/05. Roles and Permissions/05_07-Demo User-defined Server Roles.mp4 49 MB
Security and Encryption in SQL Server 2012 and 2014/02. Server and System Security/02_06-Enabling TCP on an Instance by Script.mp4 47.7 MB
Security and Encryption in SQL Server 2012 and 2014/05. Roles and Permissions/05_06-Demo Server Permissions.mp4 44.9 MB
Security and Encryption in SQL Server 2012 and 2014/05. Roles and Permissions/05_08-Demo Setting Permissions.mp4 44.1 MB
Security and Encryption in SQL Server 2012 and 2014/02. Server and System Security/02_09-Encrypting the Connection Between Client and Server Using SSL.mp4 43.8 MB
Security and Encryption in SQL Server 2012 and 2014/06. Fighting SQL Injections/06_05-Installing and Using SQLMap.mp4 43.7 MB
Security and Encryption in SQL Server 2012 and 2014/07. Encryption/07_10-Demo Encrypting Data With Authenticators.mp4 43.4 MB
Security and Encryption in SQL Server 2012 and 2014/02. Server and System Security/02_08-Fixing a TCP Port for an Instance.mp4 37.1 MB
Security and Encryption in SQL Server 2012 and 2014/07. Encryption/07_07-Demo Encrypting Data Using a Symmetric Key.mp4 36.3 MB
Security and Encryption in SQL Server 2012 and 2014/06. Fighting SQL Injections/06_02-Demo Basic SQL Injection Techniques.mp4 34.8 MB
Security and Encryption in SQL Server 2012 and 2014/05. Roles and Permissions/05_11-Demo Mapping Windows Groups to Database Users.mp4 27 MB
Security and Encryption in SQL Server 2012 and 2014/06. Fighting SQL Injections/06_07-How to Prevent Injection.mp4 26.7 MB
Security and Encryption in SQL Server 2012 and 2014/04. Authentication and Logins/04_06-Demo Creating Logins.mp4 26.1 MB
Security and Encryption in SQL Server 2012 and 2014/03. Penetration Testing/03_04-Extracting Information From SQL Server Using Metasploit.mp4 25 MB
Security and Encryption in SQL Server 2012 and 2014/07. Encryption/07_04-Demo Database Master Key.mp4 24.5 MB
Security and Encryption in SQL Server 2012 and 2014/06. Fighting SQL Injections/06_08-Detecting Common Injection Patterns.mp4 24.2 MB
Security and Encryption in SQL Server 2012 and 2014/04. Authentication and Logins/04_04-Demo Principals.mp4 24.2 MB
Security and Encryption in SQL Server 2012 and 2014/06. Fighting SQL Injections/06_09-Demo Avoiding Dynamic SQL.mp4 23.9 MB
Security and Encryption in SQL Server 2012 and 2014/02. Server and System Security/02_01-Module Introduction and System Account.mp4 22.2 MB
Security and Encryption in SQL Server 2012 and 2014/07. Encryption/07_05-Transparent Data Encryption.mp4 21.3 MB
Security and Encryption in SQL Server 2012 and 2014/04. Authentication and Logins/04_05-Demo Using SIDs.mp4 20.5 MB
Security and Encryption in SQL Server 2012 and 2014/02. Server and System Security/02_03-Surface Area Configuration.mp4 20.3 MB
Security and Encryption in SQL Server 2012 and 2014/06. Fighting SQL Injections/06_03-The Different Types of Injections.mp4 18 MB
Security and Encryption in SQL Server 2012 and 2014/06. Fighting SQL Injections/06_10-Ownership Chaining.mp4 16.3 MB
Security and Encryption in SQL Server 2012 and 2014/02. Server and System Security/02_07-Hiding an Instance in SQL Server Browser.mp4 15.7 MB
Security and Encryption in SQL Server 2012 and 2014/03. Penetration Testing/03_02-Using Metasploit to Discover SQL Server Instance.mp4 15.7 MB
Security and Encryption in SQL Server 2012 and 2014/07. Encryption/07_02-Encryption Keys Symmetric and Asymmetric Encryption.mp4 14.2 MB
Security and Encryption in SQL Server 2012 and 2014/07. Encryption/07_06-Demo Encrypted Backup in SQL Server 2014.mp4 13.7 MB
Security and Encryption in SQL Server 2012 and 2014/04. Authentication and Logins/04_07-Demo Password Policies.mp4 13.7 MB
Security and Encryption in SQL Server 2012 and 2014/07. Encryption/07_08-Demo Using Asymmetric Keys.mp4 13.5 MB
Security and Encryption in SQL Server 2012 and 2014/07. Encryption/07_03-Service and Database Master Keys.mp4 13.3 MB
Security and Encryption in SQL Server 2012 and 2014/01. Introduction to Security With SQL Server/01_08-Demo Client Connections.mp4 13 MB
Security and Encryption in SQL Server 2012 and 2014/04. Authentication and Logins/04_02-Demo Login Modes.mp4 12.8 MB
Security and Encryption in SQL Server 2012 and 2014/07. Encryption/07_11-Non-reversible Encryption With Hashing.mp4 11.9 MB
Security and Encryption in SQL Server 2012 and 2014/04. Authentication and Logins/04_08-Demo Enabling and Disabling Logins and Users.mp4 10.5 MB
Security and Encryption in SQL Server 2012 and 2014/01. Introduction to Security With SQL Server/01_04-Demo Stealing Database Files.mp4 10.4 MB
Security and Encryption in SQL Server 2012 and 2014/01. Introduction to Security With SQL Server/01_05-There are More Risks Than Data Access.mp4 9.2 MB
Security and Encryption in SQL Server 2012 and 2014/02. Server and System Security/02_04-Opening Ports on Windows Firewall With the GUI.mp4 8 MB
Security and Encryption in SQL Server 2012 and 2014/05. Roles and Permissions/05_03-What are Securables and How to Assign Permissions.mp4 7.1 MB
Security and Encryption in SQL Server 2012 and 2014/06. Fighting SQL Injections/06_01-Introduction, What are SQL Injections.mp4 6.2 MB
Security and Encryption in SQL Server 2012 and 2014/04. Authentication and Logins/04_09-Demo Changing and Disabling sa.mp4 5.9 MB
Security and Encryption in SQL Server 2012 and 2014/02. Server and System Security/02_10-Using Extended Protection Against Authentication Relay Attacks.mp4 5.8 MB
Security and Encryption in SQL Server 2012 and 2014/04. Authentication and Logins/04_01-Introduction.mp4 5.6 MB
Security and Encryption in SQL Server 2012 and 2014/04. Authentication and Logins/04_10-Conclusion.mp4 4.9 MB
Security and Encryption in SQL Server 2012 and 2014/05. Roles and Permissions/05_12-Summary.mp4 4.5 MB
Security and Encryption in SQL Server 2012 and 2014/03. Penetration Testing/03_05-Summary.mp4 4.3 MB
Security and Encryption in SQL Server 2012 and 2014/07. Encryption/07_12-Summary.mp4 4.2 MB
Security and Encryption in SQL Server 2012 and 2014/01. Introduction to Security With SQL Server/01_06-What Tools do we Need.mp4 4.2 MB
Security and Encryption in SQL Server 2012 and 2014/05. Roles and Permissions/05_09-System Database Users.mp4 3.9 MB
Security and Encryption in SQL Server 2012 and 2014/01. Introduction to Security With SQL Server/01_02-Why do we Need Security.mp4 3.9 MB
Security and Encryption in SQL Server 2012 and 2014/04. Authentication and Logins/04_03-Authentication and Permission Model.mp4 3.9 MB
Security and Encryption in SQL Server 2012 and 2014/02. Server and System Security/02_11-Conclusion.mp4 3.9 MB
Security and Encryption in SQL Server 2012 and 2014/05. Roles and Permissions/05_02-Principals, Roles, Owners, ....mp4 3.9 MB
Security and Encryption in SQL Server 2012 and 2014/01. Introduction to Security With SQL Server/01_03-What do we Need to Secure.mp4 3.8 MB
Security and Encryption in SQL Server 2012 and 2014/01. Introduction to Security With SQL Server/01_07-How Clients are Connecting to SQL Server.mp4 3.4 MB
Security and Encryption in SQL Server 2012 and 2014/05. Roles and Permissions/05_04-Fixed Server Roles.mp4 3.4 MB
Security and Encryption in SQL Server 2012 and 2014/03. Penetration Testing/03_01-Introduction.mp4 3.3 MB
Security and Encryption in SQL Server 2012 and 2014/05. Roles and Permissions/05_10-Database Roles.mp4 3.2 MB
Security and Encryption in SQL Server 2012 and 2014/01. Introduction to Security With SQL Server/01_01-Course Introduction.mp4 3.2 MB
Security and Encryption in SQL Server 2012 and 2014/01. Introduction to Security With SQL Server/01_09-Summary.mp4 3.2 MB
Security and Encryption in SQL Server 2012 and 2014/05. Roles and Permissions/05_01-Introduction, Permissions.mp4 2.4 MB
Security and Encryption in SQL Server 2012 and 2014/06. Fighting SQL Injections/06_04-Some SQL Injection Tools.mp4 2.1 MB
Security and Encryption in SQL Server 2012 and 2014/07. Encryption/07_01-Introduction.mp4 1 MB
Name
udp://tracker.coppersurfer.tk:6969/announce
udp://tracker.open-internet.nl:6969/announce
udp://tracker.leechers-paradise.org:6969/announce
udp://exodus.desync.com:6969/announce
udp://tracker.internetwarriors.net:1337/announce
udp://tracker.opentrackr.org:1337/announce
udp://9.rarbg.to:2710/announce
udp://9.rarbg.me:2710/announce
http://tracker3.itzmx.com:6961/announce
http://tracker1.itzmx.com:8080/announce
udp://thetracker.org:80/announce
udp://open.demonii.si:1337/announce
udp://bt.xxx-tracker.com:2710/announce
udp://tracker.torrent.eu.org:451/announce
udp://tracker.cyberia.is:6969/announce
udp://tracker.tiny-vps.com:6969/announce
udp://denis.stalker.upeer.me:6969/announce
http://open.acgnxtracker.com:80/announce
udp://ipv4.tracker.harry.lu:80/announce
udp://explodie.org:6969/announce
udp://tracker.opentrackr.org:1337/announce
udp://tracker.zer0day.to:1337/announce
udp://tracker.coppersurfer.tk:6969/announce
udp://tracker.leechers-paradise.org:6969/announce
udp://tracker.internetwarriors.net:1337/announce
udp://mgtracker.org:6969/announce
udp://explodie.org:6969/announce

Loading...