Security-and-Encryption--plF0
05. Roles and Permissions\\/05_05-Demo Fixed Server Roles.mp464.19MB
02. Server and System Security\\/02_02-Other System Accounts.mp456.13MB
02. Server and System Security\\/02_05-Opening Ports on Windows Firewall by sc< x> ript.mp455.59MB
06. Fighting SQL Injections\\/06_06-Demo Using SQLp to Perform Injection Against our Server.mp452.60MB
07. Encryption\\/07_09-Demo Using Certificates.mp452.38MB
03. Penetration Testing\\/03_03-Cracking the SA Password.mp449.25MB
05. Roles and Permissions\\/05_07-Demo User-defined Server Roles.mp448.99MB
02. Server and System Security\\/02_06-Enabling TCP on an Instance by sc< x> ript.mp447.74MB
05. Roles and Permissions\\/05_06-Demo Server Permissions.mp444.86MB
05. Roles and Permissions\\/05_08-Demo Setting Permissions.mp444.13MB
02. Server and System Security\\/02_09-Encrypting the Connection Between Client and Server Using SSL.mp443.78MB
06. Fighting SQL Injections\\/06_05-Installing and Using SQLp.mp443.67MB
07. Encryption\\/07_10-Demo Encrypting Data With Authenticators.mp443.40MB
02. Server and System Security\\/02_08-Fixing a TCP Port for an Instance.mp437.10MB
07. Encryption\\/07_07-Demo Encrypting Data Using a Symmetric Key.mp436.33MB
06. Fighting SQL Injections\\/06_02-Demo Basic SQL Injection Techniques.mp434.84MB
05. Roles and Permissions\\/05_11-Demo pping Windows Groups to Databa< x> se Users.mp427.04MB
06. Fighting SQL Injections\\/06_07-How to Prevent Injection.mp426.72MB
04. Authentication and Logins\\/04_06-Demo Creating Logins.mp426.05MB
03. Penetration Testing\\/03_04-Extracting Infortion From SQL Server Using me< x> tasploit.mp425.03MB
07. Encryption\\/07_04-Demo Databa< x> se ster Key.mp424.55MB
06. Fighting SQL Injections\\/06_08-Detecting Common Injection Patterns.mp424.18MB
04. Authentication and Logins\\/04_04-Demo Principals.mp424.17MB
06. Fighting SQL Injections\\/06_09-Demo oiding Dynamic SQL.mp423.88MB
02. Server and System Security\\/02_01-Module Introduction and System Account.mp422.23MB
07. Encryption\\/07_05-Transparent Data Encryption.mp421.28MB
04. Authentication and Logins\\/04_05-Demo Using SIDs.mp420.50MB
02. Server and System Security\\/02_03-Surface Area Configuration.mp420.27MB
06. Fighting SQL Injections\\/06_03-The Different Types of Injections.mp418.01MB
06. Fighting SQL Injections\\/06_10-Ownership Chaining.mp416.32MB
02. Server and System Security\\/02_07-Hiding an Instance in SQL Server Browser.mp415.74MB
03. Penetration Testing\\/03_02-Using me< x> tasploit to Discover SQL Server Instance.mp415.72MB
07. Encryption\\/07_02-Encryption Keys Symmetric and Asymmetric Encryption.mp414.17MB
07. Encryption\\/07_06-Demo Encrypted Backup in SQL Server 2014.mp413.68MB
04. Authentication and Logins\\/04_07-Demo Password Policies.mp413.65MB
07. Encryption\\/07_08-Demo Using Asymmetric Keys.mp413.54MB
07. Encryption\\/07_03-Service and Databa< x> se ster Keys.mp413.29MB
01. Introduction to Security With SQL Server\\/01_08-Demo Client Connections.mp413.02MB
04. Authentication and Logins\\/04_02-Demo Login Modes.mp412.83MB
07. Encryption\\/07_11-Non-reversible Encryption With Hashing.mp411.93MB
04. Authentication and Logins\\/04_08-Demo Enabling and Disabling Logins and Users.mp410.46MB
01. Introduction to Security With SQL Server\\/01_04-Demo Stealing Databa< x> se Files.mp410.37MB
01. Introduction to Security With SQL Server\\/01_05-There are More Risks Than Data Access.mp49.15MB
02. Server and System Security\\/02_04-Opening Ports on Windows Firewall With the GUI.mp48.01MB
05. Roles and Permissions\\/05_03-What are Securables and How to Assign Permissions.mp47.13MB
06. Fighting SQL Injections\\/06_01-Introduction What are SQL Injections.mp46.19MB
04. Authentication and Logins\\/04_09-Demo Changing and Disabling sa.mp45.93MB
02. Server and System Security\\/02_10-Using Extended Protection Against Authentication Relay Attacks.mp45.80MB
04. Authentication and Logins\\/04_01-Introduction.mp45.57MB
04. Authentication and Logins\\/04_10-Conclusion.mp44.94MB
05. Roles and Permissions\\/05_12-Sumry.mp44.51MB
03. Penetration Testing\\/03_05-Sumry.mp44.35MB
07. Encryption\\/07_12-Sumry.mp44.23MB
01. Introduction to Security With SQL Server\\/01_06-What Tools do we Need.mp44.15MB
05. Roles and Permissions\\/05_09-System Databa< x> se Users.mp43.91MB
01. Introduction to Security With SQL Server\\/01_02-Why do we Need Security.mp43.91MB
04. Authentication and Logins\\/04_03-Authentication and Permission Model.mp43.89MB
02. Server and System Security\\/02_11-Conclusion.mp43.89MB
05. Roles and Permissions\\/05_02-Principals Roles Owners ....mp43.86MB
01. Introduction to Security With SQL Server\\/01_03-What do we Need to Secure.mp43.83MB
01. Introduction to Security With SQL Server\\/01_07-How Clients are Connecting to SQL Server.mp43.39MB
05. Roles and Permissions\\/05_04-Fixed Server Roles.mp43.36MB
03. Penetration Testing\\/03_01-Introduction.mp43.27MB
05. Roles and Permissions\\/05_10-Databa< x> se Roles.mp43.20MB
01. Introduction to Security With SQL Server\\/01_01-Course Introduction.mp43.19MB
01. Introduction to Security With SQL Server\\/01_09-Sumry.mp43.17MB
05. Roles and Permissions\\/05_01-Introduction Permissions.mp42.37MB
06. Fighting SQL Injections\\/06_04-Some SQL Injection Tools.mp42.05MB
07. Encryption\\/07_01-Introduction.mp41.04MB
- CreateTime2019-05-09
- UpdateTime2019-05-09
- FileTotalCount69
- TotalSize2.64GBHotTimes6ViewTimes10DMCA Report EmailmagnetLinkThunderTorrent DownBaiduYunLatest Search: 1.BID-039 2.EBOD-139 3.MXSPS-270 4.RCT-163 5.CADV-185 6.VREDS-026 7.KIBD-040 8.BF-218 9.DFDA-085 10.NFDM-185 11.NFDM-122 12.KAGS-014 13.DFDA-080 14.MCSR-073 15.DECB-001 16.MIBD-530 17.QXL-84 18.TRVO-02 19.CESD-026 20.IDBD-365 21.RKI-185 22.GEKSD-042 23.DVDPS-771 24.MOZD-24 25.HAVD-575 26.BNDV-00802 27.ONSD-198 28.DAZD-026 29.ONSD-574 30.ONSD-459 31.ONSD-679 32.JAMD-022 33.NSPS-110 34.TMRD-488 35.FUT-002 36.MAMA-244 37.OBST-026 38.KWBD-104 39.CETD-104 40.NATR-282 41.MAMA-315 42.DASD-179 43.ONI-006 44.GST-028 45.MXSPS-020 46.VENU-269 47.SBB-150 48.MBR-075 49.TKPGD-663 50.GG-200 51.GUN-701 52.KT-196 53.DDR-900 54.LGD-011 55.EZD-128 56.NWF-193 57.GEN-018 58.SP-649 59.HE-035 60.ISF-006 61.AWKL-001 62.KVKL-001 63.KAR-097 64.DPA-002 65.RMDB-466 66.GS-606 67.RD-040 68.JYKJV-004 69.IMGS-056 70.039 71.139 72.270 73.163 74.185 75.026 76.040 77.218 78.085 79.185 80.122 81.014 82.080 83.073 84.001 85.530 86.84 87.02 88.026 89.365 90.185 91.042 92.771 93.24 94.575 95.00802 96.198 97.026 98.574 99.459 100.679 101.022 102.110 103.488 104.002 105.244 106.026 107.104 108.104 109.282 110.315 111.179 112.006 113.028 114.020 115.269 116.150 117.075 118.663 119.200 120.701 121.196 122.900 123.011 124.128 125.193 126.018 127.9 128.035 129.006 130.001 131.001 132.097 133.002 134.466 135.606 136.040 137.004 138.056