EC-Council Certified Secure Programmer
EC-Council Certified Secure Programmer
EC-Council Certified Secure Programmer
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
• Transact-SQL• Create Symmetric Key in T-SQL• Create Asymmetric Key in T-SQL• Certificates• Create Certificate in T-SQL• SQL Server Security: Administrator Checklist• Database Programming Best Practices• SQL Server Installation:o Authenticationo Authorization• Best Practices for Database Authorization• Auditing and Intrusion Detection• Enabling Auditing• Database Security Auditing Tools:o AppDetectiveProo NGSSquirrelo AuditProPage 25Module 12: SQL Rootkits• Rootkits• SQL Server Rootkit• Threats of SQL Rootkits• Evolution of SQL Rootkits• How a Rootkit Works• SQL Server 2000o Rootkit Attack on SQL Server 2000o Screenshot: Password Tamperinghttp://www.eccouncil.org<strong>EC</strong>-<strong>Council</strong>