Which of these standards would you commonly associate with LDAP?
Most organizations maintain a centralized database that’s used for authentication, user identification, and many other purposes. In this video, you’ll learn how LDAP and Secure LDAP can be used to efficiently manage these large user databases.
Database security can sometimes be circumvented by poorly designed software. In this video, you’ll learn how SQL injection, XML injection, and LDAP injection can get data from the most secure databases.
Today’s networks use complex protocols to resolve IP addresses, maintain user databases, transfer files, and manage infrastructure devices. In this video, you’ll learn about DHCP, DNS, LDAP and X.500, SNMP, SMB, SSH, and SFTP.
The Lightweight Directory Access Protocol is a common method of accessing data over the network. In this video, you’ll learn how LDAP is structured and how the X.500 directory information tree can provide you with efficient access to your network directories.
SQL injections have been responsible for some of our industry’s largest data breaches. In this video, you’ll learn about the fundamentals of SQL, XML, and LDAP code injection, and you’ll watch as we use a SQL injection attack to gain access to a protected system without any login credentials.