Securing Databases

Watch the first few minutes on us! If you'd like to watch the entire video and hundreds more like it, download code samples, access offline videos and skills assessments, and use the discussion forums, log in or purchase a subscription.


Ilya Pogrebensky


Some of the most prolific hack attacks in recent years have targeted databases that store information insecurely or that are insecure themselves. In Part 3, Ilya introduces common attack vectors against databases as well as techniques for defending against them.

Table of Contents

{{toc.Position}} {{toc.Text}}

Related Links

  • {{link.LinkText}} (requires a paid subscription)


This course is part of the following series: