Computer networks are built to support business functionality and beyond communication the result of business is data. The data important to your business is your company’s digital assets; it needs organization, maintenance and above all protection from malicious attackers. The modern corporate enterprise contains database solutions used to take care of data. Ensuring that this data doesn’t get into the hands of unauthorized employees, means that you need to recognize and secure it from this threat. The evolution of security training has shown us that the most effective way to learn about security is by learning from the people that know how to attack your systems. By understanding the threat from the attacker’s perspective, you can develop effective assessment methodologies and ultimately secure what really matters from ever increasing threat.
Why should you attend this course?
Upon completing this course, delegates should be able to understand:
- The fundamental concepts behind database systems
- Key components within a database deployment
- The integration of databases into business solutions
- The process of thorough database assessment, including tools and methodologies
- Techniques used by hackers to exploit database flaws and vulnerabilities
- Practical assessment and attack vector considerations, through hands-on experience
Who should attend this course?
Internal security teams, database administrators and security consultants concerned with the insecurity of database systems, the exposure they have to network and data compromises, and assessment techniques used to close security holes.