Intercepting Server Communications [FREE COURSE VIDEO]

March 24, 2022

In this short video from our Database Hacking course you will learn about intercepting server communications. We will focus on the TDS packets this time. Dive in! 

This course about database pentesting shows several ways to compromise a database in order to steal and modify data, or even put it out of order or destroy it. Hence, this course is going to cover several aspects of the most popular database systems such as Microsoft SQL server, Oracle Database, MySQL, PostgreSQL as a relational database and MongoDB as a NoSQL database.

You will learn about these database systems, their architecture, most common administration tasks, existing tools to use for every step in the pentest process and how to build your own tools.

What skills will you gain? 

  • Basic database admin skills
  • Testing for databases
  • Intercepting server traffic
  • SQL essentials
  • Pentesting a wide range of database solutions
  • Using a wide range of security tools
  • Database security
  • Creating your own security tools

Why this course? 

Databases are usually the core of every organization's IT infrastructure. Databases hold enterprise data and, therefore, in your security strategy, it’s key to maintain the security of databases.

Since in databases you can usually find the core data of most organizations, it is a must to know how to protect it from every kind of possible threat in order to maintain your business processes running and to guarantee its confidentiality. On the other hand, most of the data managed by databases concerns third party persons or companies so that we must ensure it is managed in such a way to be in compliance with regulatory rules defined for every kind of data.

Who is this course for? 

This course is intended for security staff and database administrators. It is also recommended for people who want to learn about database security and pentesting

[custom-related-posts title="Related Posts" none_text="None found" order_by="title" order="ASC"]

Recommended From Hakin9
Security firm RSA Security breached
Security firm RSA Security breached

RSA Security is one of the biggest players in the enterprise security landscape, featuring advanced

Social media zombies: HBGary, USAF and the government
Social media zombies: HBGary, USAF and the government

HBGary ownage has probably been the most prominent example of complete take over carried out

Microsoft MPE privilege flaw identified
Microsoft MPE privilege flaw identified

Microsoft's Malware Protection Engine has been patched as Argeniss security expert identifies an 'elevation of

Virus hits London Stock Exchange (LSE)
Virus hits London Stock Exchange (LSE)

The London Stock Exchange website was attacked by malware hidden inside an advert on February

Notify of

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Inline Feedbacks
View all comments
© HAKIN9 MEDIA SP. Z O.O. SP. K. 2023
What certifications or qualifications do you hold?
Max. file size: 150 MB.

What level of experience should the ideal candidate have?
What certifications or qualifications are preferred?

Download Free eBook

Step 1 of 4


We’re committed to your privacy. Hakin9 uses the information you provide to us to contact you about our relevant content, products, and services. You may unsubscribe from these communications at any time. For more information, check out our Privacy Policy.