YoVDO

Ethical Hacking: SQL Injection

Offered By: Pluralsight

Tags

SQL Injection Courses Cybersecurity Courses Ethical Hacking Courses Web Application Security Courses Data Exfiltration Courses Network Reconnaissance Courses

Course Description

Overview

Pluralsight is not an official partner or accredited training center of
EC-Council. This course goes through how to detect SQL injection and identify risks as you to become an ethical hacker with a strong SQL injection understanding.

Pluralsight is not an official partner or accredited training center of EC-Council. Ever since we started connecting websites to databases, SQL injection has been a serious security risk with dire ramifications. The ability for attackers to run arbitrary queries against vulnerable systems can result in data exposure, modification, and in some cases, entire system compromise. SQL injection is classified as the number one risk on the web today due to the "perfect storm" of risk factors. It's very easily discoverable, very easily exploited, and the impact of a successful attack is severe. Add to that the fact that injection risks remain rampant, it's clear how it deserves that number one spot. This course takes you through everything from understanding the SQL syntax used by attackers, basic injection attacks, database discovery and data exfiltration, advanced concepts, and even using injection for network reconnaissance and running system commands. It's everything an ethical hacker needs to know to be effective in identifying the SQL injection risk in target systems. This course is part of the Ethical Hacking Series. http://blog.pluralsight.com/learning-path-ethical-hacking

Syllabus

  • Why SQL Injection Matters 20mins
  • Understanding SQL Queries 23mins
  • The Mechanics of SQL Injection Attacks 45mins
  • Discovering Schema and Extracting Data 45mins
  • Blind SQL Injection 46mins
  • Advanced SQL Injection Concepts 44mins
  • Defending Against Attacks 44mins
  • Evasion Techniques 20mins
  • Automating Attacks 33mins

Taught by

Troy Hunt

Related Courses

Hacking and Patching
University of Colorado System via Coursera
Software Design Threats and Mitigations
University of Colorado System via Coursera
Introduction to Cybersecurity for Teachers
Raspberry Pi Foundation via FutureLearn
Identifying Security Vulnerabilities
University of California, Davis via Coursera
Web Application Security Testing with Burp Suite
Coursera Project Network via Coursera