Basics of SQL Injection - Penetration Testing for Ethical Hackers

Basics of SQL Injection - Penetration Testing for Ethical Hackers
SQL injection is a common hacking technique used to retrieve or destroy data from a database without permission. It is considered one of the top web application security risks.

SQL injection is a common hacking technique used to retrieve or destroy data from a database without permission. It is considered one of the top web application security risks.

In this course, you will learn how SQL injection works so you are able to defended against this hacker attack in your own web applications.

⭐️ Course Contents ⭐️
⌨️ (0:00:00) Introduction
⌨️ (0:02:33) What is SQL Injection
⌨️ (0:06:56) Lab Setup
⌨️ (0:11:04) Basics of SQL
⌨️ (0:16:33) Classic Injection Bypass
⌨️ (0:26:01) Types of SQL Injection
⌨️ (0:30:21) Union Based SQL Injection
⌨️ (0:41:08) Error Based SQL Injection
⌨️ (0:53:27) Boolean Based SQL Injection
⌨️ (1:03:04) Time-Based SQL Injection
⌨️ (1:11:39) Semi-Automated SQL Injection
⌨️ (1:24:02) Fully Automated SQL Injection
⌨️ (1:37:11) Defending Against SQL Injections

Suggest:

Build a Quiz Application in Python

Create an Arkanoid Game with TypeScript - Tutorial

Redis Course - In-Memory Database Tutorial

How to Build a Career in Tech: Kurt Kemple Connects the Dots

Data Structures - Full Course Using C and C++

How to Build a Career in Tech: Henri Helvetica Connects the Dots