Basics of SQL Injection - Penetration Testing for Ethical Hackers

Basics of SQL Injection - Penetration Testing for Ethical Hackers
SQL injection is a common hacking technique used to retrieve or destroy data from a database without permission. It is considered one of the top web application security risks.

SQL injection is a common hacking technique used to retrieve or destroy data from a database without permission. It is considered one of the top web application security risks.

In this course, you will learn how SQL injection works so you are able to defended against this hacker attack in your own web applications.

⭐️ Course Contents ⭐️
⌨️ (0:00:00) Introduction
⌨️ (0:02:33) What is SQL Injection
⌨️ (0:06:56) Lab Setup
⌨️ (0:11:04) Basics of SQL
⌨️ (0:16:33) Classic Injection Bypass
⌨️ (0:26:01) Types of SQL Injection
⌨️ (0:30:21) Union Based SQL Injection
⌨️ (0:41:08) Error Based SQL Injection
⌨️ (0:53:27) Boolean Based SQL Injection
⌨️ (1:03:04) Time-Based SQL Injection
⌨️ (1:11:39) Semi-Automated SQL Injection
⌨️ (1:24:02) Fully Automated SQL Injection
⌨️ (1:37:11) Defending Against SQL Injections

Suggest:

Redis Course - In-Memory Database Tutorial

Learn Python by Thinking in Types - Full Course

Microservice Architecture and System Design with Python & Kubernetes – Full Course

Stack Data Structure Tutorial – Solve Coding Challenges

Build a Quiz Application in Python

How to Build a Career in Tech: Henri Helvetica Connects the Dots