Learn SQL +Security(pen) testing from Scratch

BY
Udemy

Acquire knowledge of the fundamentals of SQL for various pen testing and web security activities.

Mode

Online

Fees

₹ 4099

Quick Facts

particular details
Medium of instructions English
Mode of learning Self study
Mode of Delivery Video and Text Based

Course overview

A penetration test is a legitimate simulation operation used to assess the security of a computer system. To identify and illustrate the effects of system vulnerabilities on the organization, penetration testers employ the same equipment, methodologies, and procedures as attackers. Participants who want to improve their database testing and security testing abilities can enroll in Learn SQL +Security(pen) testing from Scratch online certification, which is designed by Rahul Shetty - founder of RahulShettyAcademy.com and presented by Udemy. 

Learn SQL +Security(pen) testing from Scratch online course incorporates 13 hours of digital lectures, 25 articles, and 3 downloadable resources, and it seeks to find the connection by addressing both of these subjects and providing the participants an advantage over other engineers in the profession. Learn SQL +Security(pen) testing from Scratch online training cover a range of topics related to SQL and pen testing including hijacking mechanism, parameter tampering, SQL injection, brute force attack, aggregate function, SQL server, schema validation, database validation, database queries, SQL queries, and more. 

The highlights

  • Certificate of completion
  • Self-paced course
  • 13 hours of pre-recorded video content
  • 25 articles
  • 3 downloadable resources

Program offerings

  • Online course
  • Learning resources
  • 30-day money-back guarantee
  • Unlimited access
  • Accessible on mobile devices and tv

Course and certificate fees

Fees information
₹ 4,099
certificate availability

Yes

certificate providing authority

Udemy

What you will learn

Database knowledge Sql knowledge

After completing the Learn SQL +Security(pen) testing from Scratch certification course, participants will be introduced to the fundamentals of SQL for pen testing and security testing operations. Participants will study how SQL queries, database queries, subqueries, SQL server functions, aggregate functions, string functions, HAVING clauses, GROUP BY statements, inner join, outer join, left join, and right join work. Participants will gain knowledge of techniques for manipulating parameters, data constraints, hijacking mechanisms, schema validation, and database validation. Additionally, participants will gain knowledge of the techniques used in XSS, SQL injections, and brute force attacks.

The syllabus

Course FAQs

  • Why to learn SQL and Security Testing? and how this course is designed
  • Please Note

Introduction to SQL

  • Introduction to DataBase
  • Introduction to SQL and MySQL
  • Downloading MySQL server with workbench
  • Overview of SQL Editor with basic features
  • SQL basic Material for reference

CRUD operations on Database with Practical examples

  • Creating Database and pointing to it
  • Creating Tables in database
  • Inserting records into Table
  • Retrieving records from the Table
  • SQL commands glossary on discussed Topics

Altering Table Schema operations

  • Adding and modifying records in a table
  • Deleting records and dropping database
  • Updating rows in a table
  • Modifying operations example
  • SQL Glossary on discussed topics

SQL Logical operators to retrieve Data

  • Select Distinct keyword in queries
  • SQL WHERE command usage
  • Logical operators on Queries AND OR - 1
  • Logical operators 'In' 'Between'- 2

Regular expressions in writing Smart SQL Queries

  • Regular expressions Introduction
  • Wild cards usage in Queries -1
  • SORT by usage in Queries
  • SQL glossary on discussed topics

Deeper Understanding on GroupBy, Aggregate functions with practical examples

  • Importance of Group By in SQL
  • Combination of GroupBy and SQL functions(Min,Max,Avg)
  • Usage of Having keyword with GroupBy and Aggregate functions
  • Difference between Having and Where keyword and when to use them
  • Practise Exercises on GroupBy,Having,Where and Aggregate functions keyword -1
  • Practise Exercises on GroupBy,Having,Where and Aggregate functions keyword- 2
  • SQL glossary on discussed topics

Building SQL Sub queries with examples

  • SubQueries syntax and usage
  • SubQueries Example

SQL Joins, Inner Joins, Outer joins, Left & Right joins with Interview questions

  • SQL Joins usage and its advantages
  • SQL Joins Example
  • Relation on subqueries and Joins
  • Practical examples on Joins and subqueries
  • Left and Right joins importance in SQL
  • Practical example on Inner joins, Left join, Right Join

Understand SQL String functions and Views with examples

  • Importance of views in Database
  • Views example on Database
  • String functions - 1
  • String functions - 2
  • String functions -3
  • SQL glossary on discussed topics

Miscellaneous SQL keywords(Union, Intersect, Exist, Case, UnionAll) and their usage

  • Importance of Union and Union All SQL Keyword
  • Query to intersect records from two tables
  • Exists keyword usage in SQL
  • CASE Statement in SQL with example
  • SQL GLossary

Importance of Data constraints for Database Validations

  • NOT NUll constraint -1
  • Not Null Constraint Validations and Testing - 2
  • Default Constraint Validations and Testing - 3
  • Unique Constraint Validations and Testing - 4
  • Primary Key Constraint validation and Testing -5
  • SQL glossary on discussed topics

Importance of Foreign Key and Primary key with real time examples

  • Importance of Foreign Key constraint in SQL
  • Understand Foreign key rules and constraints with examples
  • On DELETE CASCADE Keyword to force rules on Foreign key deletion
  • SQL Glossary

Practice Exercises for Interviews with Solutions

  • Practice, practice, practice !!!
  • Practice Exercise/Interview Questions- 1
  • Practice Exercise/Interview Questions- 2
  • Solutions for Exercise - 1
  • Solutions for Exercise -2

JDBC Connectivity for Integration with Selenium (Basic Automation knowledge req

  • Jdbc odbc programming-Creating Project
  • Creating Database Tables and connecting to Jdbc java code
  • Retrieving data from Database with Java code
  • jdbc code download

SQL Injection

  • What is SQL Injecting
  • How to identify SQL loop holes in web application
  • Exposing Security loopholes with malicious SQL syntax
  • List of urls Pattern which can cause attack with SQL
  • Material for reference

Complete Unix Material

  • Unix for Beginners- 2

Important Note

  • Important Note

Introduction to Security Testing - Phase 2

  • Why is security Testing gaining Importance day by day!

Security Testing Basic Terminologies

  • What is Http and Https?
  • How can we avoid Man in middle attacks?
  • Http Methods overview in talking to servers
  • Fiddler Demo- Monitoring Network traffic
  • Understanding Fiddler to intercept requests
  • Material for Reference

XSS - Cross Site Scripting Vulnerability Testing

  • What is XSS? How it can damage Websites
  • Detecting XSS Vulnerability for Websites - 1
  • Detecting XSS Vulnerability for Websites - 2
  • ByPassing Client Validation to perform XSS
  • Encoding all the inputs to avoid Attacks
  • Types of Attack - Reflected XSS
  • Types of Attack - Persistent XSS
  • How to handle cross site scripting in IE browser
  • Material for Reference

Importance of Cookies and their role in Security

  • What are cookies and where are they stored
  • Session cookie sensitive data Threats
  • How can we stop Cookies hijacking
  • Methods to Prevent cookie steal -Secure Attribute
  • Preventing cookies steal -Http Attribute flag
  • Domain and path attribute to restrict cookies
  • Setting Time Period for Sessions- Security Safety Tip
  • Material for Reference

Session Hijacking and Cross Site Forgery Attacks

  • What is CSRF? How can it cause threat
  • Session Hijacking with illegal requests
  • Avoid Cross SIte forgeries with Token Mechanism
  • Checklist for Pen Testers to check CSRF Attacks
  • Material for Reference

Parameter Tampering to steal sensitive data

  • Different sources to intercept requests
  • Importance of having Server side Validations
  • Intercepting requests with fiddler tool
  • Material for Reference

Account Security

  • Steps to be taken for Password setting
  • List of Hacking Passwords and Precautions which need to be taken
  • Sources of Attacking Passwords
  • Best Practices to be followed in securing Account
  • Bruteforce attack handler Mechanism
  • Material for Reference
  • Bonus Lecture

Instructors

Mr Rahul Shetty
Instructor
Freelancer

Articles

Trending Courses

Popular Courses

Popular Platforms

Learn more about the Courses

Download the Careers360 App on your Android phone

Regular exam updates, QnA, Predictors, College Applications & E-books now on your Mobile

Careers360 App
150M+ Students
30,000+ Colleges
500+ Exams
1500+ E-books