Learn SQL +Security(pen) testing from Scratch

  • CategoryOther
  • TypeTutorials
  • LanguageEnglish
  • Total size7.4 GB
  • Uploaded Bycg3780
  • Downloads99
  • Last checkedAug. 19th '21
  • Date uploadedAug. 16th '21
  • Seeders 4
  • Leechers0

Infohash : 77544C4295C8AB3B5E052FC5B2A73315F341959A


Learn SQL +Security(pen) testing from Scratch
Genre: eLearning | MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz
Language: English | Size: 7.36 GB | Duration: 13h 31m
Step by step Tutorial to learn SQL and Web Security testing with real time examples


What you'll learn
You will gain the ability to design any complex SQL to query a database- (SQL)
Indepth understanding of GROUP BY,Subqueries,aggregate functions, SQL Server functions,HAVING clauses -(SQL)
Understand the difference between the INNER JOIN, LEFT/RIGHT OUTER JOIN, and FULL OUTER JOIN- (SQL)
You will understand the Importance of Session Hijacking Mechanisim and their confidential data use -(Security Testing)
You can investigate application behavior with Parameter Tampering and Brute force attacks-(Security Testing)
You will get the knowledge of all basics with Http that might cause attacking malicious inputs-(Security Testing)
Create or interact with existing databases and test the Database for schema validations - (SQL)
Detect Request forgery Designs if present any in Web applications --(Security Testing)
You can Clear any Interview on SQL with the Interview questions covered - (SQL)
Description
SQL and Security Testing are Additional skills which every software Engineer need to have irrespective of their role in Project. And this course fulfills the gap by teaching both these topics and also gives you an edge compared to other Engineers at your work .And of course these are one of the common skills which are tested in every Software Engineer Interview.
What make this course special for beginners?
"No more Boring slides or Definitions. I will write every SQL query before you in lecture and teach every topic needed to master in SQL with Practical examples
And also This Tutorial will give all the weapons you needed to investigate and unlock the Security Holes in the Web application with powerful Penetration testing approach
Course lectures are conceptually driven with root level explanations and bring you to the level where you can write any kind of SQL query and detect any kind of security bugs in the application
This course covers :
MYSQL :
Introduction to SQL -- MySQLOverview -- Start up commands to Setup Database andTables -- Database testing to validate Schema -- Altering Table Schema operations -- Queries to retrieve Data Logical operators on Queries -- Wild cards usage in Queries -- SQL Functions with real time scenarios -- Importance of Group By in SQL -- Advanced SQL Concepts -- SubQueries syntax and usage -- SQL Joins usage and its advantages -- Importance of views in Database -- SQL String functions -- Dataconstraints with DataBase Testing perspective -- Practise Exercises for Interviews with Solutions -- SQL glossary on discussed topics
Security Testing :
Course Contents: Basics of Security Testing Terminologies involved in Security Domain Top OWASP principles Cross site Scrpiting Xss examples Cookies Importance Danger with stealing of cookies Session Hijacking Cross site forgery Attacks Parameter Tampering Methods to Intercept requests Account Management Password security guidelines Brute force mechanism Importance of Client side validations
Who this course is for:
Any IT professional no matter in what field they are into
QA Testers who want to enhance their skill on Data base Testing and Security testing
Freshers/Graduates who want to learn computer science foundations

Files:

Learn SQL +Security(pen) testing from Scratch
  • !!! More Courses !!!.txt (1.1 KB)
  • 1. Course FAQ's
    • 1. Why to learn SQL and Security Testing and how this course is designed-en_US.srt (8.3 KB)
    • 1. Why to learn SQL and Security Testing and how this course is designed.mp4 (39.5 MB)
    • Please Note.html (0.3 KB)
    10. Understand SQL String functions and Views with examples
    • 1. Importance of views in Database-en_US.srt (9.2 KB)
    • 1. Importance of views in Database.mp4 (43.2 MB)
    • 2. views example on Database-en_US.srt (8.0 KB)
    • 2. views example on Database.mp4 (23.3 MB)
    • 3. String functions - 1-en_US.srt (10.6 KB)
    • 3. String functions - 1.mp4 (105.0 MB)
    • 4. String functions - 2-en_US.srt (9.8 KB)
    • 4. String functions - 2.mp4 (121.9 MB)
    • 5. String functions -3-en_US.srt (7.5 KB)
    • 5. String functions -3.mp4 (45.5 MB)
    • SQL glossary on discussed topics.html (0.8 KB)
    11. Miscelleanous SQL keywords(Union,Intersect,Exist, Case,UnionAll) and their usage
    • 1. Importance of Union and Union All SQL Keyword-en_US.srt (8.8 KB)
    • 1. Importance of Union and Union All SQL Keyword.mp4 (103.3 MB)
    • 2. Query to intersect records from two tables-en_US.srt (11.8 KB)
    • 2. Query to intersect records from two tables.mp4 (128.3 MB)
    • 3. Exists keyword usage in SQL-en_US.srt (6.8 KB)
    • 3. Exists keyword usage in SQL.mp4 (67.3 MB)
    • 4. CASE Statement in SQL with example-en_US.srt (13.3 KB)
    • 4. CASE Statement in SQL with example.mp4 (136.9 MB)
    • SQL GLossary.html (0.8 KB)
    12. Importance of Data constraints for Database Validations
    • 1. NOT NUll constraint -1-en_US.srt (6.9 KB)
    • 1. NOT NUll constraint -1.mp4 (15.7 MB)
    • 2. Not Null Constraint Validations and Testing - 2-en_US.srt (8.6 KB)
    • 2. Not Null Constraint Validations and Testing - 2.mp4 (50.5 MB)
    • 3. Default Constraint Validations and Testing - 3-en_US.srt (7.8 KB)
    • 3. Default Constraint Validations and Testing - 3.mp4 (33.7 MB)
    • 4. Unique Constraint Validations and Testing - 4-en_US.srt (6.5 KB)
    • 4. Unique Constraint Validations and Testing - 4.mp4 (47.7 MB)
    • 5. Primary Key Constraint validaton and Testing -5-en_US.srt (11.8 KB)
    • 5. Primary Key Constraint validaton and Testing -5.mp4 (79.2 MB)
    • SQL glossary on discussed topics.html (0.4 KB)
    13. Importance of Foreign Key and Primary key with real time examples
    • 1. Importance of Foreign Key constraint in SQL-en_US.srt (12.7 KB)
    • 1. Importance of Foreign Key constraint in SQL.mp4 (47.1 MB)
    • 2. Understand Foreign key rules and constraints with examples-en_US.srt (16.5 KB)
    • 2. Understand Foreign key rules and constraints with examples.mp4 (242.7 MB)
    • 3. On DELETE CASCADE Keyword to force rules on Foreign key deletion-en_US.srt (11.3 KB)
    • 3. On DELETE CASCADE Keyword to force rules on Foreign key deletion.mp4 (96.1 MB)
    • SQL Glossary.html (1.3 KB)
    14. Practise Exercises for Interviews with Solutions
    • 1. Practise Practise Practise !!!-en_US.srt (6.2 KB)
    • 1. Practise Practise Practise !!!.mp4 (11.5 MB)
    • Practise ExerciseInterview Questions- 1.html (4.2 KB)
    • Practise ExerciseInterview Questions- 2.html (5.2 KB)
    • Solutions for Exercise - 1.html (1.8 KB)
    • Solutions for Exercise -2.html (1.9 KB)
    15. JDBC Connectivity for Integration with Selenium (Basic Automation knowledge req
    • 1. Jdbc odbc programming-Creating Project-en_US.srt (7.9 KB)
    • 1. Jdbc odbc programming-Creating Project.mp4 (33.3 MB)
    • 2. Creating Database Tables and connecting to Jdbc java code-en_US.srt (19.1 KB)
    • 2. Creating Database Tables and connecting to Jdbc java code.mp4 (123.0 MB)
    • 3. Retrieving data from Database with Java code-en_US.srt (7.1 KB)
    • 3. Retrieving data from Database with Java code.mp4 (46.7 MB)
    • jdbc code download.html (1.4 KB)
    16. SQL Injection
    • 1. What is SQL Injecting-en_US.srt (8.3 KB)
    • 1. What is SQL Injecting.mp4 (34.0 MB)
    • 2. How to identify SQL loop holes in web application-en_US.srt (14.8 KB)
    • 2. How to identify SQL loop holes in web application.mp4 (105.9 MB)
    • 3. Exposing Security loop holes with malcious SQL syntax-en_US.srt (10.8 KB)
    • 3. Exposing Security loop holes with malcious SQL syntax.mp4 (73.0 MB)
    • 4. List of urls Pattern which can cause attack with SQL-en_US.srt (9.8 KB)
    • 4. List of urls Pattern which can cause attack with SQL.mp4 (21.4 MB)
    • Material for reference.html (1.1 KB)
    17. Complete Unix Material
    • Unix for Beginners- 2.html (0.0 KB)
    18. Important Note
    • Important Note.html (0.3 KB)
    19. Introduction to Security Testing - Phase 2
    • 1. Why security Testing gaining Importance day by day!-en_US.srt (11.0 KB)
    • 1. Why security Testing gaining Importance day by day!.mp4 (175.9 MB)
    2. Introduction to SQL
    • 1. Introduction to DataBase-en_US.srt (12.6 KB)
    • 1. Introduction to DataBase.mp4 (44.4 MB)
    • 2. Introduction to SQL and MySQL-en_US.srt (8.3 KB)
    • 2. Introduction to SQL and MySQL.mp4 (27.1 MB)
    • 3. Downloading MySQL server with workbench-en_US.srt (10.2 KB)
    • 3. Downloading MySQL server with workbench.mp4 (101.1 MB)
    • 4. Overview of SQL Editor with basic features-en_US.srt (6.9 KB)
    • 4. Overview of SQL Editor with basic features.mp4 (20.7 MB)
    • SQL basic Material for reference.html (0.0 KB)
    20. Security Testing Basic Terminologies
    • 1. What is Http and Https-en_US.srt (12.2 KB)
    • 1. What is Http and Https.mp4 (45.7 MB)
    • 2. How can we avoid Man in middle attacks-en_US.srt (8.3 KB)
    • 2. How can we avoid Man in middle attacks.mp4 (41.4 MB)
    • 3. Http Methods overview in talking to servers-en_US.srt (11.4 KB)
    • 3. Http Methods overview in talking to servers.mp4 (60.2 MB)
    • 4. Fiddler Demo- Monitoring Network traffic-en_US.srt (3.1 KB)
    • 4. Fiddler Demo- Monitoring Network traffic.mp4 (15.0 MB)
    • 5. Understanding Fiddler to intercept requests-en_US.srt (9.2 KB)
    • Code:

      • udp://opentor.org:2710/announce
      • udp://tracker.torrent.eu.org:451/announce
      • udp://open.stealth.si:80/announce
      • udp://ipv4.tracker.harry.lu:80/announce
      • udp://tracker.uw0.xyz:6969/announce
      • udp://tracker.dler.org:6969/announce
      • udp://9.rarbg.com:2870/announce
      • udp://www.torrent.eu.org:451/announce
      • udp://tracker2.dler.com:80/announce