SQL Server - Security for Developers
File List
- 2.1. Roles and Privileges in SQL Server/05.Demo - Create a user in SQL Server.mp4 13.4 MB
- 3.2. SQL Injection/19.Demo - Dynamic SQL parameterization.mp4 10.8 MB
- 4.3. Securing Your Network/26.Demo - Linked servers.mp4 10.3 MB
- 2.1. Roles and Privileges in SQL Server/09.Demo - Building custom roles.mp4 9.5 MB
- 4.3. Securing Your Network/28.Demo - Azure SQL Database firewalls.mp4 7.9 MB
- 4.3. Securing Your Network/27.Azure SQL Database firewalls.mp4 7.8 MB
- 4.3. Securing Your Network/25.Linked server security.mp4 7.6 MB
- 2.1. Roles and Privileges in SQL Server/13.Demo - Contained users.mp4 7.4 MB
- 4.3. Securing Your Network/21.Network security.mp4 7.4 MB
- 3.2. SQL Injection/20.External protection around SQL injection.mp4 7.0 MB
- 2.1. Roles and Privileges in SQL Server/07.Least privileges principal.mp4 6.5 MB
- 2.1. Roles and Privileges in SQL Server/08.Building custom roles in SQL Server.mp4 6.2 MB
- 4.3. Securing Your Network/23.TLS 1.0 vs. TLS 1.2.mp4 6.1 MB
- 3.2. SQL Injection/16.Writing proper SQL procedures.mp4 5.9 MB
- 2.1. Roles and Privileges in SQL Server/10.Predefined roles in SQL Server.mp4 5.9 MB
- 2.1. Roles and Privileges in SQL Server/06.Roles and privileges overview.mp4 5.8 MB
- 2.1. Roles and Privileges in SQL Server/04.Azure AD and SQL authentication.mp4 5.8 MB
- 3.2. SQL Injection/17.Demo - Stored procedures vs. dynamic SQL.mp4 5.8 MB
- 2.1. Roles and Privileges in SQL Server/03.Logins and users.mp4 5.7 MB
- 3.2. SQL Injection/15.SQL injection vulnerabilities.mp4 5.5 MB
- 2.1. Roles and Privileges in SQL Server/12.Contained users and their benefits.mp4 5.3 MB
- 2.1. Roles and Privileges in SQL Server/11.Roles in Azure SQL Database.mp4 5.1 MB
- 4.3. Securing Your Network/22.Encrypting connections to SQL Server.mp4 4.9 MB
- 3.2. SQL Injection/14.Overview of SQL injection.mp4 4.4 MB
- 1.Introduction/02.Course software.mp4 4.4 MB
- 4.3. Securing Your Network/24.Upgrading TLS with SQL Server.mp4 3.7 MB
- 3.2. SQL Injection/18.Dynamic SQL and input checking.mp4 3.2 MB
- 1.Introduction/01.Build secure applications in SQL Server.mp4 2.9 MB
- 5.Conclusion/29.Next steps.mp4 927.3 KB
- 2.1. Roles and Privileges in SQL Server/05.Demo - Create a user in SQL Server.en.srt 9.2 KB
- 2.1. Roles and Privileges in SQL Server/07.Least privileges principal.en.srt 8.8 KB
- 4.3. Securing Your Network/27.Azure SQL Database firewalls.en.srt 8.0 KB
- 2.1. Roles and Privileges in SQL Server/08.Building custom roles in SQL Server.en.srt 7.9 KB
- 4.3. Securing Your Network/21.Network security.en.srt 7.7 KB
- 2.1. Roles and Privileges in SQL Server/04.Azure AD and SQL authentication.en.srt 7.7 KB
- 3.2. SQL Injection/15.SQL injection vulnerabilities.en.srt 7.5 KB
- 2.1. Roles and Privileges in SQL Server/03.Logins and users.en.srt 7.3 KB
- 2.1. Roles and Privileges in SQL Server/06.Roles and privileges overview.en.srt 7.2 KB
- 3.2. SQL Injection/20.External protection around SQL injection.en.srt 7.2 KB
- 4.3. Securing Your Network/25.Linked server security.en.srt 6.8 KB
- 3.2. SQL Injection/16.Writing proper SQL procedures.en.srt 6.7 KB
- 2.1. Roles and Privileges in SQL Server/12.Contained users and their benefits.en.srt 6.7 KB
- 3.2. SQL Injection/19.Demo - Dynamic SQL parameterization.en.srt 6.2 KB
- 4.3. Securing Your Network/26.Demo - Linked servers.en.srt 6.1 KB
- 4.3. Securing Your Network/28.Demo - Azure SQL Database firewalls.en.srt 6.1 KB
- 2.1. Roles and Privileges in SQL Server/10.Predefined roles in SQL Server.en.srt 5.9 KB
- 2.1. Roles and Privileges in SQL Server/11.Roles in Azure SQL Database.en.srt 5.9 KB
- 4.3. Securing Your Network/23.TLS 1.0 vs. TLS 1.2.en.srt 5.7 KB
- 4.3. Securing Your Network/22.Encrypting connections to SQL Server.en.srt 5.6 KB
- 3.2. SQL Injection/14.Overview of SQL injection.en.srt 5.4 KB
- 2.1. Roles and Privileges in SQL Server/09.Demo - Building custom roles.en.srt 5.4 KB
- Exercise Files/Ex_Files_SQL_Security_Dev.zip 4.7 KB
- 2.1. Roles and Privileges in SQL Server/13.Demo - Contained users.en.srt 4.6 KB
- 4.3. Securing Your Network/24.Upgrading TLS with SQL Server.en.srt 4.4 KB
- 3.2. SQL Injection/17.Demo - Stored procedures vs. dynamic SQL.en.srt 4.2 KB
- 3.2. SQL Injection/18.Dynamic SQL and input checking.en.srt 3.5 KB
- 1.Introduction/02.Course software.en.srt 3.0 KB
- 1.Introduction/01.Build secure applications in SQL Server.en.srt 1.1 KB
- 5.Conclusion/29.Next steps.en.srt 422 bytes
Download Torrent
Related Resources
Copyright Infringement
If the content above is not authorized, please contact us via anywarmservice[AT]gmail.com. Remember to include the full url in your complaint.