logo

SQL Introduction and Injection

Hack and protect yourself from SQL Injection.

  • No Rating
  • (0 Reviews)
  • 0 User Enrolled
  • 9.99
  • 200
  • Course Includes
  • English
  • 2:26:00 hours on-demand video
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
  • 30-Day Money-Back Guarantee


What you will learn

  • What SQL Injection?
  • How it works?
  • The different types?
  • Comprehensive curriculum to give you in-depth understanding of SQL and SQL Injection.
  • Practice various different types of SQL Injection vulnerabilities
  • Learn advanced Identification techniques by which you can spot a SQL Injection
  • Learn advanced exploitation techniques by which you can determine the true impact of the vulnerability
  • Evaluate various security scanners/tools and see which tool does what
  • Learn to distinguish between a false positive and a real vulnerability

Requirements

  • Basic computer and Internet browsing knowledge One should have a laptop powered with MAC or linux OS or Windows OS

Description

In this course, you’ll learn how to communicate with relational databases through SQL. how to manipulate data and build queries that communicate with more than one table.

WHY LEARN SQL?
people search through data to find insights to inform strategy, marketing, operations, and a plethora of other categories.
There are a ton of businesses that use large, relational databases, which makes a basic understanding of SQL a great employable skill not only for data scientists, but for almost everyone.

What is SQL Injection?
A SQL Injection is a form of attack that takes advantage of an improperly filtered user and takes the input acquired to manipulate a database.

Why do I need this certification?
When this attack is used, an unauthorized person can access the database of a website and extract the data from that source.

Course Content

Introduction to course
preview 1:15min
Disclaimer
preview 0:39min
Setting Up
preview 2:25min
Kali Linux Latest Version
preview 3:42min
Free VPN to hide your location
preview 2:12min
Setting up Metasploitable
preview 1:31min
Installation Wamp
preview 6:11min
XAMP installation
preview 1:50min
DVWA installation in windows
preview 2:05min
DVWA Security Setup
preview 1:35min
Create Database
0:55min
Drop Database
0:59min
SQL Create Table
1:54min
Rename Table
0:44min
Update Command
1:07min
Where Clause
0:52min
Alias Name
0:54min
SQL Aggregate function Min,max,count,avg,sum
4:08min
Limit Operater
1:03min
Distinct Keyward
0:58min
In Operator
0:53min
Order by Clause
0:59min
Order by Descending Clause
1:07min
Union and Union all
2:29min
Join Clause
1:11min
Additional Deplayment Considerations
2:53min
Count Operator
0:53min
Delete SQL Injection
1:51min
Introduction
2:06min
Testing by Inference
2:00min
SQL Prevention
3:43min
Checking Vulnerable Website
2:10min
Scanning for SQL injection using nmap
2:05min
Manipulating Parameters
2:00min
Terminating SQL Injection
7:24min
Automating SQL Injection Exploitation
4:39min
Inline SQL Injection Practice
1:51min