11.07.2015 Views

EC-Council Certified Secure Programmer

EC-Council Certified Secure Programmer

EC-Council Certified Secure Programmer

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

• Transact-SQL• Create Symmetric Key in T-SQL• Create Asymmetric Key in T-SQL• Certificates• Create Certificate in T-SQL• SQL Server Security: Administrator Checklist• Database Programming Best Practices• SQL Server Installation:o Authenticationo Authorization• Best Practices for Database Authorization• Auditing and Intrusion Detection• Enabling Auditing• Database Security Auditing Tools:o AppDetectiveProo NGSSquirrelo AuditProPage 25Module 12: SQL Rootkits• Rootkits• SQL Server Rootkit• Threats of SQL Rootkits• Evolution of SQL Rootkits• How a Rootkit Works• SQL Server 2000o Rootkit Attack on SQL Server 2000o Screenshot: Password Tamperinghttp://www.eccouncil.org<strong>EC</strong>-<strong>Council</strong>

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!