Video Description

In these segments we discuss the various types of inherent vulnerabilities and threats there are to a database system, and explore some tools and techniques for mitigating them. We'll define and discuss new terms such as Aggregation, Polyinsatiation and Code Injection and provide examples of what they are and how they work.

Course Modules

CISSP Archive (10 Domain - 2014)

CISSP 2015 Domain Restructuring