Этот материал находится в платной подписке. Оформи премиум подписку и смотри или слушай Learn SQL + Security(pen) testing from Scratch, а также все другие курсы, прямо сейчас!
Премиум
  • Урок 1. 00:06:56
    Why to learn SQL and Security Testing? and how this course is designed
  • Урок 2. 00:09:56
    Introduction to DataBase
  • Урок 3. 00:06:28
    Introduction to SQL and MySQL
  • Урок 4. 00:07:30
    Downloading MySQL server with workbench
  • Урок 5. 00:05:26
    Overview of SQL Editor with basic features
  • Урок 6. 00:04:48
    creating Database and pointing to it
  • Урок 7. 00:08:02
    Creating Tables in database
  • Урок 8. 00:07:56
    Inserting records into Table
  • Урок 9. 00:06:23
    Retrieving records from the Table
  • Урок 10. 00:06:58
    Adding and modifying records in a table
  • Урок 11. 00:04:49
    Deleting records and droping database
  • Урок 12. 00:07:33
    Updating rows in a table
  • Урок 13. 00:05:56
    Modifying operations example
  • Урок 14. 00:06:51
    Select Distinct keyword in queris
  • Урок 15. 00:09:28
    SQL WHERE command usage
  • Урок 16. 00:07:07
    Logical operators on Queries AND OR - 1
  • Урок 17. 00:08:38
    Logical operators 'In' 'Between'- 2
  • Урок 18. 00:07:18
    Regular expressions Introduction
  • Урок 19. 00:08:04
    Wild cards usage in Qeuries -1
  • Урок 20. 00:05:24
    SORT by usage in Queries
  • Урок 21. 00:12:39
    Importance of Group By in SQL
  • Урок 22. 00:07:50
    Combination of GroupBy and SQL functions(Min,Max,Avg)
  • Урок 23. 00:11:25
    Usage of Having keyword with GroupBy and Aggregate functions
  • Урок 24. 00:11:22
    Difference between Having and Where keyword and when to use them
  • Урок 25. 00:07:55
    Practise Exercises on GroupBy,Having,Where and Aggregate functions keyword -1
  • Урок 26. 00:09:32
    Practise Exercises on GroupBy,Having,Where and Aggregate functions keyword- 2
  • Урок 27. 00:08:09
    SubQueries syntax and usage
  • Урок 28. 00:06:08
    SubQueries Example
  • Урок 29. 00:05:47
    SQL Joins usage and its advantages
  • Урок 30. 00:07:31
    SQL Joins Example
  • Урок 31. 00:09:35
    Relation on subqueries and Joins
  • Урок 32. 00:10:26
    Practical examples on Joins and subqueries
  • Урок 33. 00:10:34
    Left and Right joins importance in SQL
  • Урок 34. 00:16:16
    Practical example on Inner joins, Left join, Right Join
  • Урок 35. 00:07:56
    Importance of views in Database
  • Урок 36. 00:07:19
    views example on Database
  • Урок 37. 00:09:24
    String functions - 1
  • Урок 38. 00:08:49
    String functions - 2
  • Урок 39. 00:06:12
    String functions -3
  • Урок 40. 00:08:03
    Importance of Union and Union All SQL Keyword
  • Урок 41. 00:10:13
    Query to intersect records from two tables
  • Урок 42. 00:06:17
    Exists keyword usage in SQL
  • Урок 43. 00:12:40
    CASE Statement in SQL with example
  • Урок 44. 00:06:13
    NOT NUll constraint -1
  • Урок 45. 00:08:11
    Not Null Constraint Validations and Testing - 2
  • Урок 46. 00:06:29
    Default Constraint Validations and Testing - 3
  • Урок 47. 00:05:44
    Unique Constraint Validations and Testing - 4
  • Урок 48. 00:09:46
    Primary Key Constraint validaton and Testing -5
  • Урок 49. 00:10:22
    Importance of Foreign Key constraint in SQL
  • Урок 50. 00:15:29
    Understand Foreign key rules and constraints with examples
  • Урок 51. 00:10:34
    On DELETE CASCADE Keyword to force rules on Foreign key deletion
  • Урок 52. 00:04:55
    Practise Practise Practise !!!
  • Урок 53. 00:07:04
    Jdbc odbc programming-Creating Project
  • Урок 54. 00:16:49
    Creating Database Tables and connecting to Jdbc java code
  • Урок 55. 00:06:47
    Retrieving data from Database with Java code
  • Урок 56. 00:07:33
    What is SQL Injecting
  • Урок 57. 00:13:20
    How to identify SQL loop holes in web application
  • Урок 58. 00:09:21
    Exposing Security loop holes with malcious SQL syntax
  • Урок 59. 00:07:35
    List of urls Pattern which can cause attack with SQL
  • Урок 60. 00:09:27
    Why security Testing gaining Importance day by day!
  • Урок 61. 00:09:59
    What is Http and Https?
  • Урок 62. 00:06:53
    How can we avoid Man in middle attacks?
  • Урок 63. 00:09:29
    Http Methods overview in talking to servers
  • Урок 64. 00:03:20
    Fiddler Demo- Monitoring Network traffic
  • Урок 65. 00:07:32
    Understanding Fiddler to intercept requests
  • Урок 66. 00:09:50
    What is XSS? How it can damage Web sites
  • Урок 67. 00:08:15
    Detecting XSS Vulnerability for Websites - 1
  • Урок 68. 00:06:15
    Detecting XSS Vulnerability for Websites - 2
  • Урок 69. 00:09:09
    ByPassing Client Validation to perform XSS
  • Урок 70. 00:10:03
    Encoding all the inputs to avoid Attacks
  • Урок 71. 00:08:31
    Types of Attack - Reflected XSS
  • Урок 72. 00:09:59
    Types of Attack - Persisistence XSS
  • Урок 73. 00:10:23
    How to handle cross site scripting in IE browser
  • Урок 74. 00:08:49
    What are cookies and where are they stored
  • Урок 75. 00:09:44
    Session cookie sensitive data Threats
  • Урок 76. 00:07:42
    How can we stop Cookies hijacking
  • Урок 77. 00:13:57
    Methods to Prevent cookie steal -Secure Attribute
  • Урок 78. 00:11:45
    Preventing cookies steal -Http Attribute flag
  • Урок 79. 00:11:54
    Domain and path attribute to restrict cookies
  • Урок 80. 00:06:02
    Setting Timeperiod for Sessions- Security Safety Tip
  • Урок 81. 00:11:51
    What is CSRF? How can it cause threat
  • Урок 82. 00:10:23
    Session Hijacking with illegal requests
  • Урок 83. 00:08:48
    Avoid Cross SIte forgeries with Token Mechanisim
  • Урок 84. 00:08:43
    Checklist for Pen Testers to check CSRF Attacks
  • Урок 85. 00:05:36
    Different sources to intercept requests
  • Урок 86. 00:06:01
    Importance of having Server side Validations
  • Урок 87. 00:06:49
    Intercepting requests with fiddler tool
  • Урок 88. 00:08:47
    Steps to be taken for Password setting
  • Урок 89. 00:05:58
    List of Hacking Passwords and Precautions which need to be taken
  • Урок 90. 00:08:07
    Sources of Attacking Passwords
  • Урок 91. 00:09:21
    Best Practices to be followed in securing Account
  • Урок 92. 00:12:37
    Bruteforce attack handler Mechanism