- Why to learn SQL and Security Testing? and how this course is designed
- Please Note
Learn SQL +Security(pen) testing from Scratch
Quick Facts
particular | details | |||
---|---|---|---|---|
Medium of instructions
English
|
Mode of learning
Self study
|
Mode of Delivery
Video and Text Based
|
Course overview
A penetration test is a legitimate simulation operation used to assess the security of a computer system. To identify and illustrate the effects of system vulnerabilities on the organization, penetration testers employ the same equipment, methodologies, and procedures as attackers. Participants who want to improve their database testing and security testing abilities can enroll in Learn SQL +Security(pen) testing from Scratch online certification, which is designed by Rahul Shetty - founder of RahulShettyAcademy.com and presented by Udemy.
Learn SQL +Security(pen) testing from Scratch online course incorporates 13 hours of digital lectures, 25 articles, and 3 downloadable resources, and it seeks to find the connection by addressing both of these subjects and providing the participants an advantage over other engineers in the profession. Learn SQL +Security(pen) testing from Scratch online training cover a range of topics related to SQL and pen testing including hijacking mechanism, parameter tampering, SQL injection, brute force attack, aggregate function, SQL server, schema validation, database validation, database queries, SQL queries, and more.
The highlights
- Certificate of completion
- Self-paced course
- 13 hours of pre-recorded video content
- 25 articles
- 3 downloadable resources
Program offerings
- Online course
- Learning resources
- 30-day money-back guarantee
- Unlimited access
- Accessible on mobile devices and tv
Course and certificate fees
Fees information
certificate availability
Yes
certificate providing authority
Udemy
Who it is for
What you will learn
After completing the Learn SQL +Security(pen) testing from Scratch certification course, participants will be introduced to the fundamentals of SQL for pen testing and security testing operations. Participants will study how SQL queries, database queries, subqueries, SQL server functions, aggregate functions, string functions, HAVING clauses, GROUP BY statements, inner join, outer join, left join, and right join work. Participants will gain knowledge of techniques for manipulating parameters, data constraints, hijacking mechanisms, schema validation, and database validation. Additionally, participants will gain knowledge of the techniques used in XSS, SQL injections, and brute force attacks.
The syllabus
Course FAQs
Introduction to SQL
- Introduction to DataBase
- Introduction to SQL and MySQL
- Downloading MySQL server with workbench
- Overview of SQL Editor with basic features
- SQL basic Material for reference
CRUD operations on Database with Practical examples
- Creating Database and pointing to it
- Creating Tables in database
- Inserting records into Table
- Retrieving records from the Table
- SQL commands glossary on discussed Topics
Altering Table Schema operations
- Adding and modifying records in a table
- Deleting records and dropping database
- Updating rows in a table
- Modifying operations example
- SQL Glossary on discussed topics
SQL Logical operators to retrieve Data
- Select Distinct keyword in queries
- SQL WHERE command usage
- Logical operators on Queries AND OR - 1
- Logical operators 'In' 'Between'- 2
Regular expressions in writing Smart SQL Queries
- Regular expressions Introduction
- Wild cards usage in Queries -1
- SORT by usage in Queries
- SQL glossary on discussed topics
Deeper Understanding on GroupBy, Aggregate functions with practical examples
- Importance of Group By in SQL
- Combination of GroupBy and SQL functions(Min,Max,Avg)
- Usage of Having keyword with GroupBy and Aggregate functions
- Difference between Having and Where keyword and when to use them
- Practise Exercises on GroupBy,Having,Where and Aggregate functions keyword -1
- Practise Exercises on GroupBy,Having,Where and Aggregate functions keyword- 2
- SQL glossary on discussed topics
Building SQL Sub queries with examples
- SubQueries syntax and usage
- SubQueries Example
SQL Joins, Inner Joins, Outer joins, Left & Right joins with Interview questions
- SQL Joins usage and its advantages
- SQL Joins Example
- Relation on subqueries and Joins
- Practical examples on Joins and subqueries
- Left and Right joins importance in SQL
- Practical example on Inner joins, Left join, Right Join
Understand SQL String functions and Views with examples
- Importance of views in Database
- Views example on Database
- String functions - 1
- String functions - 2
- String functions -3
- SQL glossary on discussed topics
Miscellaneous SQL keywords(Union, Intersect, Exist, Case, UnionAll) and their usage
- Importance of Union and Union All SQL Keyword
- Query to intersect records from two tables
- Exists keyword usage in SQL
- CASE Statement in SQL with example
- SQL GLossary
Importance of Data constraints for Database Validations
- NOT NUll constraint -1
- Not Null Constraint Validations and Testing - 2
- Default Constraint Validations and Testing - 3
- Unique Constraint Validations and Testing - 4
- Primary Key Constraint validation and Testing -5
- SQL glossary on discussed topics
Importance of Foreign Key and Primary key with real time examples
- Importance of Foreign Key constraint in SQL
- Understand Foreign key rules and constraints with examples
- On DELETE CASCADE Keyword to force rules on Foreign key deletion
- SQL Glossary
Practice Exercises for Interviews with Solutions
- Practice, practice, practice !!!
- Practice Exercise/Interview Questions- 1
- Practice Exercise/Interview Questions- 2
- Solutions for Exercise - 1
- Solutions for Exercise -2
JDBC Connectivity for Integration with Selenium (Basic Automation knowledge req
- Jdbc odbc programming-Creating Project
- Creating Database Tables and connecting to Jdbc java code
- Retrieving data from Database with Java code
- jdbc code download
SQL Injection
- What is SQL Injecting
- How to identify SQL loop holes in web application
- Exposing Security loopholes with malicious SQL syntax
- List of urls Pattern which can cause attack with SQL
- Material for reference
Complete Unix Material
- Unix for Beginners- 2
Important Note
- Important Note
Introduction to Security Testing - Phase 2
- Why is security Testing gaining Importance day by day!
Security Testing Basic Terminologies
- What is Http and Https?
- How can we avoid Man in middle attacks?
- Http Methods overview in talking to servers
- Fiddler Demo- Monitoring Network traffic
- Understanding Fiddler to intercept requests
- Material for Reference
XSS - Cross Site Scripting Vulnerability Testing
- What is XSS? How it can damage Websites
- Detecting XSS Vulnerability for Websites - 1
- Detecting XSS Vulnerability for Websites - 2
- ByPassing Client Validation to perform XSS
- Encoding all the inputs to avoid Attacks
- Types of Attack - Reflected XSS
- Types of Attack - Persistent XSS
- How to handle cross site scripting in IE browser
- Material for Reference
Importance of Cookies and their role in Security
- What are cookies and where are they stored
- Session cookie sensitive data Threats
- How can we stop Cookies hijacking
- Methods to Prevent cookie steal -Secure Attribute
- Preventing cookies steal -Http Attribute flag
- Domain and path attribute to restrict cookies
- Setting Time Period for Sessions- Security Safety Tip
- Material for Reference
Session Hijacking and Cross Site Forgery Attacks
- What is CSRF? How can it cause threat
- Session Hijacking with illegal requests
- Avoid Cross SIte forgeries with Token Mechanism
- Checklist for Pen Testers to check CSRF Attacks
- Material for Reference
Parameter Tampering to steal sensitive data
- Different sources to intercept requests
- Importance of having Server side Validations
- Intercepting requests with fiddler tool
- Material for Reference
Account Security
- Steps to be taken for Password setting
- List of Hacking Passwords and Precautions which need to be taken
- Sources of Attacking Passwords
- Best Practices to be followed in securing Account
- Bruteforce attack handler Mechanism
- Material for Reference
- Bonus Lecture