Our applications rely on some very specialized protocols to surf the Internet, transfer mail, or manage our servers. In this video, you’ll learn about some of the most popular network protocols.
Which of these standards would you commonly associate with LDAP?
Most organizations maintain a centralized database that’s used for authentication, user identification, and many other purposes. In this video, you’ll learn how LDAP and Secure LDAP can be used to efficiently manage these large user databases.
Database security can sometimes be circumvented by poorly designed software. In this video, you’ll learn how SQL injection, XML injection, and LDAP injection can get data from the most secure databases.
Today’s networks use complex protocols to resolve IP addresses, maintain user databases, transfer files, and manage infrastructure devices. In this video, you’ll learn about DHCP, DNS, LDAP and X.500, SNMP, SMB, SSH, and SFTP.