Database Security Training
Applications such as databases are often neglected when securing a network, however, they are often visible and therefore subjectable to attack externally. The "weakest link" theory has meant that databases have seen a huge increase in security "research" over recent years. It is imperative that you are aware of the security issues in using databases. Having a DBA is not always sufficient and my experience has found that it is the DBA's that are often the cause of many security issues such as roles within roles and privilege runaway.