Wireless Strengths Weaknessesand Attacks Firewalls in corporate networksDNS and DOS attacksIntrusion Detection Systems and how they workDatabase SQL DefensesSecurity weaknesses in SQL requestsSQL injection attacksBasic security concepts discussed from day one