Many vulnerabilities are inadvertently designed into hardware and software. In addition, misconfiguration opens gaps even if a system is properly architected. In this lesson, we look at managing vulnerabilities. We also walk through steps to hardening systems. Hardening is the process of configuring a system to its smallest attack surface.
Table of Contents:
00:00 - Intro
00:37 - Managing Vulnerabilities
03:06 - Client-Server Vulnerabilities
04:04 - Server Vulnerabilities
05:05 - Server Hardening
06:05 - Database Hardening
07:11 - Segmentation
08:08 - Database Encryption
Ещё видео!