Category: Database

0

How To Create New User and Set, Grant Permissions To User In MySQL and MariaDB?

MySQL provides ability to create and users from its shell. Security is important part of the database servers. In this tutorial we will examine how to create users and manage privileges in MySQL database server. We will specifically learn restrict user access to a database, database server, grant different type...

0

Security Roles and Responsibilities In Security Governance

Security role is the part where an individual plays in a complete organization security implementation and administration. In this tutorials different security roles and responsibilities in an organization. Senior Manager Senior Manager is responsible for all organization security. Senior Manager will have following roles and responsibilities Sign off all policy...

0

Introduction To Certified Information System Security Professional (CISSP)

There are a lot of security certifications in the IT sector. But only some of them are very prestigious and popular. Perhaps the most known and most respected security certificate is Certified Information System Security Professional (CISSP) certification. In this post we will get generally information about certification steps, topics,...

0

What is Penetration Test? What Are Penetration Test Phases?

Modern days IT needs are changed according to 80’s and 90’s. In the old days just operating IT was enough for success but today’s situation it is changed. We need to secure the IT environment to in order to be successful. There are different methodologies, standard, architectures to design, plan,...

0

How To Install Tenable Nessus into Kali?

Nessus is very good tool to manage vulnerabilities or vulnerability scanning. How can I install Nessus into my dpkg based pentest box? My distro my Debian, Ubuntu, Kali etc. Get License Key First step is license key. In old days Nessus was provided by Kali distribution as home version. There...

Enjoy this blog? Please spread the word :)