Useful Links
Computer Science
Databases
MySQL Database
1. Introduction to Databases and MySQL
2. Installation and Configuration
3. MySQL Architecture
4. SQL Fundamentals: Data Definition Language (DDL)
5. Data Types and Constraints
6. SQL Fundamentals: Data Manipulation Language (DML)
7. SQL Fundamentals: Data Query Language (DQL)
8. Joining Tables
9. Advanced SQL Queries
10. Indexing for Performance
11. Transactions and Concurrency
12. Stored Routines and Triggers
13. User Management and Security
14. Database Administration (DBA)
15. Advanced MySQL Topics
User Management and Security
Data Control Language (DCL)
Access Control Fundamentals
Authentication vs. Authorization
Privilege-Based Security
Principle of Least Privilege
GRANT Statement
Privilege Assignment
User and Object Specification
Grant Options
REVOKE Statement
Privilege Removal
Cascading Revocation
Security Cleanup
User Account Management
Creating Users
CREATE USER Syntax
Username and Host Specification
Password Assignment
User Modification
ALTER USER Statement
Password Changes
Account Status Control
User Removal
DROP USER Statement
Account Cleanup
Privilege Revocation
User Renaming
RENAME USER Statement
Identity Changes
Reference Updates
Authentication Methods
Native Password Authentication
SHA-256 Authentication
External Authentication Plugins
Privilege System
Privilege Types
Administrative Privileges
Database-Level Privileges
Table-Level Privileges
Column-Level Privileges
Routine-Level Privileges
Privilege Levels
Global Privileges
Server-Wide Access
Administrative Control
Database Privileges
Database-Specific Access
Schema-Level Control
Table Privileges
Table-Specific Access
Data Manipulation Control
Column Privileges
Column-Specific Access
Fine-Grained Control
Privilege Granting
Direct Privilege Assignment
Role-Based Assignment
Inheritance Mechanisms
Privilege Checking
Access Verification Process
Privilege Resolution Order
Permission Evaluation
Role-Based Access Control
Role Concepts
Privilege Grouping
Administrative Simplification
Scalable Security Management
Creating Roles
CREATE ROLE Statement
Role Naming Conventions
Role Hierarchies
Role Assignment
Granting Roles to Users
Role Activation
Default Roles
Role Management
ALTER ROLE Statement
DROP ROLE Statement
Role Information Queries
Security Best Practices
Authentication Security
Strong Password Policies
Password Complexity Requirements
Password Expiration
Account Lockout Policies
Network Security
Connection Encryption (SSL/TLS)
Host-Based Access Control
Firewall Configuration
Port Security
Application Security
SQL Injection Prevention
Parameterized Queries
Input Validation
Escape Sequence Handling
Prepared Statement Usage
Connection Security
Auditing and Monitoring
Access Logging
Failed Login Tracking
Privilege Usage Monitoring
Security Event Analysis
Previous
12. Stored Routines and Triggers
Go to top
Next
14. Database Administration (DBA)