Database Security for Cyber Professionals


Dive into the field of Cyber Security with this ’Database Security for Cyber Professionals’ training course. The course begins with an in-depth discussion on database core security, and then it moves on to topics such as platform hardening, MySQL architecture, and exploits. By the time you’ve completed this course, you will know all about storage encryption, key management, big data, and so much more! Length: 3.5 hrs

SKU: EC4Y0405 Category:

With this Database Security for Cyber Professionals training course, you will learn to understand and mitigate database threats. Learn how to secure open source and commercial database platforms against modern threats and attack vectors. This course includes a mix of conceptual lectures and detailed screencasts outlining all the steps involved with conducting test attacks and subsequently securing your database platforms.

This course is for you if you are interested in learning how to hack and protect database environments and want to know how hackers breach commercial and open source databases.

What’s Included?

Wiki_tick  Unlimited  12 months access
Wiki_tick  Access anywhere, any time
Wiki_tick  Fast effective training, written and designed by industry experts
Wiki_tick  Track your progress with our Learning Management System
Wiki_tick  Unlimited support
Wiki_tick  Save money, time and travel costs
Wiki_tick  Learn at your own pace and leisure
Wiki_tick  Easier to retain knowledge and revise topics than traditional methods
Wiki_tick  Exam preparation quizzes, tests and mock exams to ensure that you are 100% ready

£119.00Add to cart


1. Database Security for Cyber Professionals

Database Core Security Part 1 (5:00)
Database Core Security Part 2 (5:02)
Database Core Security Part 3 (5:03)
Database Core Security Part 4 (1:42)
Platform Hardening (7:44)
MySQL Security Lab Build (8:01)
MySQL Architecture and Exploits (16:32)
Locking Down MySQL (35:07)
Oracle Exploitation and Security Best Practices (43:08)
PostgreSQL Architecture, Exploits and Hardening (19:29)
Storage Encryption (18:41)
Key Management (16:55)
Big Data (17:33)