Featured resource
Tech Upskilling Playbook 2025
Tech Upskilling Playbook

Build future-ready tech teams and hit key business milestones with seven proven plays from industry leaders.

Learn more
  • Course
    • Libraries: If you want this course, consider one of these libraries.
    • Security

Specialized Hunts: Threat Hunting within Databases

Threat actors target databases for persistence, privilege escalation, and data theft. This course will teach you how to hunt for, investigate, and detect real threats within enterprise databases using practical, hands-on techniques.

Sean Wilkins  - Pluralsight course - Specialized Hunts: Threat Hunting within Databases
by Sean Wilkins

What you'll learn

Databases are common targets for attackers aiming to steal sensitive data, escalate privileges, or establish persistence, yet most environments struggle to detect these specific threats quickly. In this course, Specialized Hunts: Threat Hunting within Databases, you’ll learn how to proactively identify and investigate malicious activities within enterprise database systems. First, you’ll explore methods to detect brute-force attacks and credential abuse by analyzing authentication logs in detail. Next, you’ll discover ways to find unauthorized account creation, privilege alterations, and the removal of legitimate admins using system catalogs and audit trails. Finally, you’ll learn how to hunt for suspicious or unauthorized access to sensitive tables and data within your databases. Upon completing this course, you’ll have the skills and knowledge necessary for database threat hunting to detect, investigate, and respond to real attacks in your environment.

Table of contents

About the author

Sean Wilkins  - Pluralsight course - Specialized Hunts: Threat Hunting within Databases
Sean Wilkins

Sean Wilkins is an accomplished networking consultant and writer for infoDispersion (www.infodispersion.com) who has been in the IT field for over 20 years working with several large enterprises.

More Courses by Sean