About This Course
This course quickly introduces learners to the most common security vulnerabilities faced by databases today.
Each vulnerability is examined from a database perspective through a process of describing the threat and attack mechanisms, recognizing associated vulnerabilities, and, finally, designing, implementing, and testing effective defenses. Multiple practical demonstrations reinforce these concepts with real vulnerabilities and attacks. Learners are then challenged to design and implement the layered defenses they will need in defending their own databases.