[ FreeCourseWeb.com ] Securing SQL Server Applications
File List
- ~Get Your Files Here !/3. Auditing/2. Setting up SQL Server Auditing at the Instance Level.mp4 33.7 MB
- ~Get Your Files Here !/3. Auditing/4. Reading and Interpreting Audit Logs.mp4 28.4 MB
- ~Get Your Files Here !/4. Encryption in SQL Server/6. Using Always Encrypted.mp4 24.9 MB
- ~Get Your Files Here !/3. Auditing/1. Purpose and Advantages of Auditing and Logging.mp4 24.1 MB
- ~Get Your Files Here !/4. Encryption in SQL Server/3. Encrypting Data in SQL Server.mp4 20.9 MB
- ~Get Your Files Here !/6. Tools for Compliance Regulations/3. Keeping History Using Temporal Tables.mp4 20.3 MB
- ~Get Your Files Here !/4. Encryption in SQL Server/7. Setting up Always Encrypted with Secure Enclaves.mp4 17.9 MB
- ~Get Your Files Here !/6. Tools for Compliance Regulations/5. Using SQL Server Ledger.mp4 17.2 MB
- ~Get Your Files Here !/2. Introduction to Advanced Security Topics/5. Using SSL with Client Connections.mp4 16.4 MB
- ~Get Your Files Here !/4. Encryption in SQL Server/5. Encrypting Data at Rest.mp4 16.0 MB
- ~Get Your Files Here !/4. Encryption in SQL Server/4. Encrypting Column Data.mp4 15.3 MB
- ~Get Your Files Here !/3. Auditing/3. Setting up SQL Server Auditing in a Database.mp4 12.4 MB
- ~Get Your Files Here !/4. Encryption in SQL Server/2. Using Hash Functions for Password Storage.mp4 12.4 MB
- ~Get Your Files Here !/2. Introduction to Advanced Security Topics/1. SQL Server Security Overview.mp4 11.7 MB
- ~Get Your Files Here !/6. Tools for Compliance Regulations/2. Masking Sensitive Data Using Dynamic Data Masking.mp4 11.7 MB
- ~Get Your Files Here !/5. Fighting SQL Injection Attacks/4. Using Properly Stored Procedures and Dynamic SQL.mp4 11.2 MB
- ~Get Your Files Here !/5. Fighting SQL Injection Attacks/2. Real World Injection Threats.mp4 10.2 MB
- ~Get Your Files Here !/5. Fighting SQL Injection Attacks/1. Understanding SQL Injections.mp4 9.1 MB
- ~Get Your Files Here !/5. Fighting SQL Injection Attacks/3. Protecting T-SQL Code Against Injections.mp4 8.4 MB
- ~Get Your Files Here !/2. Introduction to Advanced Security Topics/3. Recognizing Security Threats and Vulnerabilities.mp4 6.3 MB
- ~Get Your Files Here !/4. Encryption in SQL Server/1. Understanding Encryption for Data Security.mp4 5.3 MB
- ~Get Your Files Here !/2. Introduction to Advanced Security Topics/4. Security Best Practices for Applications Accessing SQL Server.mp4 4.6 MB
- ~Get Your Files Here !/2. Introduction to Advanced Security Topics/2. Understanding the Significance of Securing Application Data.mp4 4.5 MB
- ~Get Your Files Here !/6. Tools for Compliance Regulations/1. Introduction to Compliance Regulations.mp4 3.6 MB
- ~Get Your Files Here !/1. Course Overview/1. Course Overview.mp4 3.6 MB
- ~Get Your Files Here !/6. Tools for Compliance Regulations/4. Introduction to Database Ledger.mp4 3.1 MB
- ~Get Your Files Here !/3. Auditing/2. Setting up SQL Server Auditing at the Instance Level.vtt 12.5 KB
- ~Get Your Files Here !/4. Encryption in SQL Server/6. Using Always Encrypted.vtt 12.1 KB
- ~Get Your Files Here !/2. Introduction to Advanced Security Topics/1. SQL Server Security Overview.vtt 9.9 KB
- ~Get Your Files Here !/4. Encryption in SQL Server/3. Encrypting Data in SQL Server.vtt 9.3 KB
- ~Get Your Files Here !/6. Tools for Compliance Regulations/3. Keeping History Using Temporal Tables.vtt 9.2 KB
- ~Get Your Files Here !/3. Auditing/1. Purpose and Advantages of Auditing and Logging.vtt 9.1 KB
- ~Get Your Files Here !/4. Encryption in SQL Server/5. Encrypting Data at Rest.vtt 9.0 KB
- ~Get Your Files Here !/4. Encryption in SQL Server/7. Setting up Always Encrypted with Secure Enclaves.vtt 8.2 KB
- ~Get Your Files Here !/3. Auditing/4. Reading and Interpreting Audit Logs.vtt 7.8 KB
- ~Get Your Files Here !/2. Introduction to Advanced Security Topics/5. Using SSL with Client Connections.vtt 7.7 KB
- ~Get Your Files Here !/5. Fighting SQL Injection Attacks/4. Using Properly Stored Procedures and Dynamic SQL.vtt 7.3 KB
- ~Get Your Files Here !/4. Encryption in SQL Server/4. Encrypting Column Data.vtt 7.1 KB
- ~Get Your Files Here !/6. Tools for Compliance Regulations/5. Using SQL Server Ledger.vtt 7.0 KB
- ~Get Your Files Here !/4. Encryption in SQL Server/2. Using Hash Functions for Password Storage.vtt 6.1 KB
- ~Get Your Files Here !/5. Fighting SQL Injection Attacks/1. Understanding SQL Injections.vtt 6.0 KB
- ~Get Your Files Here !/2. Introduction to Advanced Security Topics/3. Recognizing Security Threats and Vulnerabilities.vtt 5.3 KB
- ~Get Your Files Here !/6. Tools for Compliance Regulations/2. Masking Sensitive Data Using Dynamic Data Masking.vtt 5.0 KB
- ~Get Your Files Here !/5. Fighting SQL Injection Attacks/2. Real World Injection Threats.vtt 4.9 KB
- ~Get Your Files Here !/4. Encryption in SQL Server/1. Understanding Encryption for Data Security.vtt 4.8 KB
- ~Get Your Files Here !/2. Introduction to Advanced Security Topics/2. Understanding the Significance of Securing Application Data.vtt 4.2 KB
- ~Get Your Files Here !/3. Auditing/3. Setting up SQL Server Auditing in a Database.vtt 4.1 KB
- ~Get Your Files Here !/5. Fighting SQL Injection Attacks/3. Protecting T-SQL Code Against Injections.vtt 4.0 KB
- ~Get Your Files Here !/2. Introduction to Advanced Security Topics/4. Security Best Practices for Applications Accessing SQL Server.vtt 3.2 KB
- ~Get Your Files Here !/6. Tools for Compliance Regulations/4. Introduction to Database Ledger.vtt 3.2 KB
- ~Get Your Files Here !/6. Tools for Compliance Regulations/1. Introduction to Compliance Regulations.vtt 2.5 KB
- ~Get Your Files Here !/1. Course Overview/1. Course Overview.vtt 2.1 KB
- ~Get Your Files Here !/playlist.m3u 1.9 KB
- ~Get Your Files Here !/Bonus Resources.txt 386 bytes
- Get Bonus Downloads Here.url 183 bytes
Download Torrent
Related Resources
Copyright Infringement
If the content above is not authorized, please contact us via activebusinesscommunication[AT]gmail.com. Remember to include the full url in your complaint.