-
Урок 1.
00:06:56
Why to learn SQL and Security Testing? and how this course is designed
-
Урок 2.
00:09:56
Introduction to DataBase
-
Урок 3.
00:06:28
Introduction to SQL and MySQL
-
Урок 4.
00:07:30
Downloading MySQL server with workbench
-
Урок 5.
00:05:26
Overview of SQL Editor with basic features
-
Урок 6.
00:04:48
creating Database and pointing to it
-
Урок 7.
00:08:02
Creating Tables in database
-
Урок 8.
00:07:56
Inserting records into Table
-
Урок 9.
00:06:23
Retrieving records from the Table
-
Урок 10.
00:06:58
Adding and modifying records in a table
-
Урок 11.
00:04:49
Deleting records and droping database
-
Урок 12.
00:07:33
Updating rows in a table
-
Урок 13.
00:05:56
Modifying operations example
-
Урок 14.
00:06:51
Select Distinct keyword in queris
-
Урок 15.
00:09:28
SQL WHERE command usage
-
Урок 16.
00:07:07
Logical operators on Queries AND OR - 1
-
Урок 17.
00:08:38
Logical operators 'In' 'Between'- 2
-
Урок 18.
00:07:18
Regular expressions Introduction
-
Урок 19.
00:08:04
Wild cards usage in Qeuries -1
-
Урок 20.
00:05:24
SORT by usage in Queries
-
Урок 21.
00:12:39
Importance of Group By in SQL
-
Урок 22.
00:07:50
Combination of GroupBy and SQL functions(Min,Max,Avg)
-
Урок 23.
00:11:25
Usage of Having keyword with GroupBy and Aggregate functions
-
Урок 24.
00:11:22
Difference between Having and Where keyword and when to use them
-
Урок 25.
00:07:55
Practise Exercises on GroupBy,Having,Where and Aggregate functions keyword -1
-
Урок 26.
00:09:32
Practise Exercises on GroupBy,Having,Where and Aggregate functions keyword- 2
-
Урок 27.
00:08:09
SubQueries syntax and usage
-
Урок 28.
00:06:08
SubQueries Example
-
Урок 29.
00:05:47
SQL Joins usage and its advantages
-
Урок 30.
00:07:31
SQL Joins Example
-
Урок 31.
00:09:35
Relation on subqueries and Joins
-
Урок 32.
00:10:26
Practical examples on Joins and subqueries
-
Урок 33.
00:10:34
Left and Right joins importance in SQL
-
Урок 34.
00:16:16
Practical example on Inner joins, Left join, Right Join
-
Урок 35.
00:07:56
Importance of views in Database
-
Урок 36.
00:07:19
views example on Database
-
Урок 37.
00:09:24
String functions - 1
-
Урок 38.
00:08:49
String functions - 2
-
Урок 39.
00:06:12
String functions -3
-
Урок 40.
00:08:03
Importance of Union and Union All SQL Keyword
-
Урок 41.
00:10:13
Query to intersect records from two tables
-
Урок 42.
00:06:17
Exists keyword usage in SQL
-
Урок 43.
00:12:40
CASE Statement in SQL with example
-
Урок 44.
00:06:13
NOT NUll constraint -1
-
Урок 45.
00:08:11
Not Null Constraint Validations and Testing - 2
-
Урок 46.
00:06:29
Default Constraint Validations and Testing - 3
-
Урок 47.
00:05:44
Unique Constraint Validations and Testing - 4
-
Урок 48.
00:09:46
Primary Key Constraint validaton and Testing -5
-
Урок 49.
00:10:22
Importance of Foreign Key constraint in SQL
-
Урок 50.
00:15:29
Understand Foreign key rules and constraints with examples
-
Урок 51.
00:10:34
On DELETE CASCADE Keyword to force rules on Foreign key deletion
-
Урок 52.
00:04:55
Practise Practise Practise !!!
-
Урок 53.
00:07:04
Jdbc odbc programming-Creating Project
-
Урок 54.
00:16:49
Creating Database Tables and connecting to Jdbc java code
-
Урок 55.
00:06:47
Retrieving data from Database with Java code
-
Урок 56.
00:07:33
What is SQL Injecting
-
Урок 57.
00:13:20
How to identify SQL loop holes in web application
-
Урок 58.
00:09:21
Exposing Security loop holes with malcious SQL syntax
-
Урок 59.
00:07:35
List of urls Pattern which can cause attack with SQL
-
Урок 60.
00:09:27
Why security Testing gaining Importance day by day!
-
Урок 61.
00:09:59
What is Http and Https?
-
Урок 62.
00:06:53
How can we avoid Man in middle attacks?
-
Урок 63.
00:09:29
Http Methods overview in talking to servers
-
Урок 64.
00:03:20
Fiddler Demo- Monitoring Network traffic
-
Урок 65.
00:07:32
Understanding Fiddler to intercept requests
-
Урок 66.
00:09:50
What is XSS? How it can damage Web sites
-
Урок 67.
00:08:15
Detecting XSS Vulnerability for Websites - 1
-
Урок 68.
00:06:15
Detecting XSS Vulnerability for Websites - 2
-
Урок 69.
00:09:09
ByPassing Client Validation to perform XSS
-
Урок 70.
00:10:03
Encoding all the inputs to avoid Attacks
-
Урок 71.
00:08:31
Types of Attack - Reflected XSS
-
Урок 72.
00:09:59
Types of Attack - Persisistence XSS
-
Урок 73.
00:10:23
How to handle cross site scripting in IE browser
-
Урок 74.
00:08:49
What are cookies and where are they stored
-
Урок 75.
00:09:44
Session cookie sensitive data Threats
-
Урок 76.
00:07:42
How can we stop Cookies hijacking
-
Урок 77.
00:13:57
Methods to Prevent cookie steal -Secure Attribute
-
Урок 78.
00:11:45
Preventing cookies steal -Http Attribute flag
-
Урок 79.
00:11:54
Domain and path attribute to restrict cookies
-
Урок 80.
00:06:02
Setting Timeperiod for Sessions- Security Safety Tip
-
Урок 81.
00:11:51
What is CSRF? How can it cause threat
-
Урок 82.
00:10:23
Session Hijacking with illegal requests
-
Урок 83.
00:08:48
Avoid Cross SIte forgeries with Token Mechanisim
-
Урок 84.
00:08:43
Checklist for Pen Testers to check CSRF Attacks
-
Урок 85.
00:05:36
Different sources to intercept requests
-
Урок 86.
00:06:01
Importance of having Server side Validations
-
Урок 87.
00:06:49
Intercepting requests with fiddler tool
-
Урок 88.
00:08:47
Steps to be taken for Password setting
-
Урок 89.
00:05:58
List of Hacking Passwords and Precautions which need to be taken
-
Урок 90.
00:08:07
Sources of Attacking Passwords
-
Урок 91.
00:09:21
Best Practices to be followed in securing Account
-
Урок 92.
00:12:37
Bruteforce attack handler Mechanism