22 Results Found
Networks are under attack as hackers try to access systems to compromise or steal sensitive data and information. Understand the threats posed by malware, ransomware and social engineering.
A brief introduction to the basics of penetration testing.
In this video, you will learn about the latest version of ReportBuilder available in SQL Server 2008 R2.
In this video, you will learn how to a use a new feature of SQL Server 2008 called Transparent Data Encryption for enhanced security.
In this video, you will learn how to a use a new feature of SQL Server 2008 R2 and Office 2010 called PowerPivot for Self-Service Business Intelligence.
In this video, you'll learn how to utilize a great new feature of SQL Server 2008 called Policy Based Management for Multi-Server Management capabilities.
The goal of risk management is to reduce risk down to an acceptable or tolerable level. Understand countermeasures, safeguards, and security controls that can be selected to eliminate or reduce risk.
An incident is an event that could lead to loss of, or disruption to, an organization's operations, services or functions. Understand how an incident response team prepares, plans, and responds to a security breach.
A firewall is a security tool which may be a hardware or software solution that is used to filter network traffic. Understand the basic functionality of a firewall where traffic is blocked or allowed to enter the network.
In this video, you will learn about the High Availability options in SQL Server 2008: Server Clustering, Database Mirroring, Log Shipping and Peer-to-Peer Replication.