{"id":6829,"date":"2022-04-28T20:48:11","date_gmt":"2022-04-28T20:48:11","guid":{"rendered":"https:\/\/www.tun.com\/courses\/2019\/12\/23\/network-security-database-vulnerabilities\/"},"modified":"2022-04-28T20:48:11","modified_gmt":"2022-04-28T20:48:11","slug":"network-security-database-vulnerabilities","status":"publish","type":"post","link":"https:\/\/www.tun.com\/courses\/network-security-database-vulnerabilities\/ibm\/","title":{"rendered":"Network Security &#038; Database Vulnerabilities"},"content":{"rendered":"<div class=\"single_post\" style=\"margin-top:16px;\";>\n<div class=\"post-single-content box mark-links entry-content\">\n<div class=\"thecontent\">\n<h2>Description<\/h2>\n<p>This course gives you the background needed to understand basic network security.  You will learn the about Local Area Networks, TCP\/IP, the OSI Framework and routing basics.  You will learn how networking affects security systems within an organization.  You will learn the network components that guard an organization from cybersecurity attacks.<\/p>\n<p>In addition to networking, you will learn about database vulnerabilities and the tools\/knowledge needed to research a database vulnerability for a variety of databases including SQL Injection, Oracle, Mongo and Couch.  <\/p>\n<p>You will learn about various security breach types associated with databases and organizations that define standards and provide tools for cybersecurity professionals.<\/p>\n<p>This course is intended for anyone who wants to gain a basic understanding of Network Security\/Database Vulnerabilities or as the fourth course in a series of courses to acquire the skills to work in the Cybersecurity field as a Jr Cybersecurity Analyst.<\/p>\n<div style=\"height:45px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<h2 class=\"has-text-align-center\">Price: Enroll For Free!<\/h2>\n<div style=\"height:45px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<div class=\"wp-block-button aligncenter\"><a class=\"wp-block-button__link has-text-color has-very-light-gray-color has-background has-vivid-red-background-color\" href=\"https:\/\/www.coursera.org\/learn\/network-security-database-vulnerabilities\">View Class<\/a><\/div>\n<div style=\"height:55px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n<div class=\"wp-block-columns\">\n<div class=\"wp-block-column\">\n<p class=\"has-text-align-center\"><em><strong>Language:<\/strong> <\/em>English<\/p>\n<\/div>\n<div class=\"wp-block-column\">\n<p class=\"has-text-align-center\"><em><strong>Subtitles<\/strong>: <\/em>English<\/p>\n<\/div>\n<\/div>\n<p style=\"background-color:#496d89\" class=\"has-text-color has-background has-text-align-center has-very-light-gray-color\"><a href=\"https:\/\/www.coursera.org\/learn\/network-security-database-vulnerabilities\">Network Security &#038; Database Vulnerabilities<strong> &#8211; IBM<\/strong><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Description This course gives you the background needed to understand basic network security. You will learn the about Local Area Networks, TCP\/IP, the OSI Framework and routing basics. You will learn how networking affects security systems within an organization. You will learn the network components that guard an organization from cybersecurity attacks. In addition to [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":19489,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_uag_custom_page_level_css":"","_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[41],"tags":[],"class_list":["post-6829","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ibm"],"aioseo_notices":[],"uagb_featured_image_src":{"full":["https:\/\/www.tun.com\/courses\/wp-content\/uploads\/2019\/12\/IBMonline-education.png",375,225,false],"thumbnail":["https:\/\/www.tun.com\/courses\/wp-content\/uploads\/2019\/12\/IBMonline-education-150x150.png",150,150,true],"medium":["https:\/\/www.tun.com\/courses\/wp-content\/uploads\/2019\/12\/IBMonline-education-300x180.png",300,180,true],"medium_large":["https:\/\/www.tun.com\/courses\/wp-content\/uploads\/2019\/12\/IBMonline-education.png",375,225,false],"large":["https:\/\/www.tun.com\/courses\/wp-content\/uploads\/2019\/12\/IBMonline-education.png",375,225,false],"1536x1536":["https:\/\/www.tun.com\/courses\/wp-content\/uploads\/2019\/12\/IBMonline-education.png",375,225,false],"2048x2048":["https:\/\/www.tun.com\/courses\/wp-content\/uploads\/2019\/12\/IBMonline-education.png",375,225,false]},"uagb_author_info":{"display_name":"Axiom Pegasus","author_link":"https:\/\/www.tun.com\/courses\/author\/magic\/"},"uagb_comment_info":0,"uagb_excerpt":"Description This course gives you the background needed to understand basic network security. You will learn the about Local Area Networks, TCP\/IP, the OSI Framework and routing basics. You will learn how networking affects security systems within an organization. You will learn the network components that guard an organization from cybersecurity attacks. In addition to&hellip;","featured_media_src_url":"https:\/\/www.tun.com\/courses\/wp-content\/uploads\/2019\/12\/IBMonline-education.png","_links":{"self":[{"href":"https:\/\/www.tun.com\/courses\/wp-json\/wp\/v2\/posts\/6829","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.tun.com\/courses\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.tun.com\/courses\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.tun.com\/courses\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tun.com\/courses\/wp-json\/wp\/v2\/comments?post=6829"}],"version-history":[{"count":0,"href":"https:\/\/www.tun.com\/courses\/wp-json\/wp\/v2\/posts\/6829\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.tun.com\/courses\/wp-json\/wp\/v2\/media\/19489"}],"wp:attachment":[{"href":"https:\/\/www.tun.com\/courses\/wp-json\/wp\/v2\/media?parent=6829"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.tun.com\/courses\/wp-json\/wp\/v2\/categories?post=6829"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.tun.com\/courses\/wp-json\/wp\/v2\/tags?post=6829"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}