Course Information
Course Overview
Step by step Tutorial to learn SQL and Web Security testing with real time examples
SQL and Security Testing are Additional skills which every software Engineer need to have irrespective of their role in Project. And this course fulfills the gap by teaching both these topics and also gives you an edge compared to other Engineers at your work .And of course these are one of the common skills which are tested in every Software Engineer Interview.
What make this course special for beginners?
"No more Boring slides or Definitions. I will write every SQL query before you in lecture and teach every topic needed to master in SQL with Practical examplesAnd also This Tutorial will give all the weapons you needed to investigate and unlock the Security Holes in the Web application with powerful Penetration testing approach
Course lectures are conceptually driven with root level explanations and bring you to the level where you can write any kind of SQL query and detect any kind of security bugs in the application
This course covers :
MYSQL :
Introduction to SQL -- MySQLOverview -- Start up commands to Setup Database andTables -- Database testing to validate Schema -- Altering Table Schema operations -- Queries to retrieve Data Logical operators on Queries -- Wild cards usage in Queries -- SQL Functions with real time scenarios -- Importance of Group By in SQL -- Advanced SQL Concepts -- SubQueries syntax and usage -- SQL Joins usage and its advantages -- Importance of views in Database -- SQL String functions -- Dataconstraints with DataBase Testing perspective -- Practise Exercises for Interviews with Solutions -- SQL glossary on discussed topics
Security Testing :
Course Contents: Basics of Security Testing Terminologies involved in Security Domain Top OWASP principles Cross site Scrpiting Xss examples Cookies Importance Danger with stealing of cookies Session Hijacking Cross site forgery Attacks Parameter Tampering Methods to Intercept requests Account Management Password security guidelines Brute force mechanism Importance of Client side validations
Course Content
- 25 section(s)
- 117 lecture(s)
- Section 1 Course FAQ's
- Section 2 Introduction to SQL
- Section 3 CRUD operations on Database with Practical examples
- Section 4 Altering Table Schema operations
- Section 5 SQL Logical operators to retrieve Data
- Section 6 Regular expressions in writing Smart SQL Queries
- Section 7 Deeper Understanding on GroupBy, Aggregate functions with practical examples
- Section 8 Building SQL Sub queries with examples
- Section 9 SQL Joins, Inner Joins, Outer joins, Left&Right joins with Interview questions
- Section 10 Understand SQL String functions and Views with examples
- Section 11 Miscelleanous SQL keywords(Union,Intersect,Exist, Case,UnionAll) and their usage
- Section 12 Importance of Data constraints for Database Validations
- Section 13 Importance of Foreign Key and Primary key with real time examples
- Section 14 Practise Exercises for Interviews with Solutions
- Section 15 JDBC Connectivity for Integration with Selenium (Basic Automation knowledge req
- Section 16 SQL Injection
- Section 17 Complete Unix Material
- Section 18 Important Note
- Section 19 Introduction to Security Testing - Phase 2
- Section 20 Security Testing Basic Terminologies
- Section 21 XSS - Cross Site Scripting Vulnerability Testing
- Section 22 Importance of Cookies and their role in Security
- Section 23 Session Hijacking and Cross Site Forgery Attacks
- Section 24 Parameter Tampering to steal sensitive data
- Section 25 Account Security
What You’ll Learn
- You will gain the ability to design any complex SQL to query a database- (SQL), Indepth understanding of GROUP BY,Subqueries,aggregate functions, SQL Server functions,HAVING clauses -(SQL), Understand the difference between the INNER JOIN, LEFT/RIGHT OUTER JOIN, and FULL OUTER JOIN- (SQL), You will understand the Importance of Session Hijacking Mechanisim and their confidential data use -(Security Testing), You can investigate application behavior with Parameter Tampering and Brute force attacks-(Security Testing), You will get the knowledge of all basics with Http that might cause attacking malicious inputs-(Security Testing), Create or interact with existing databases and test the Database for schema validations - (SQL), Detect Request forgery Designs if present any in Web applications --(Security Testing), You can Clear any Interview on SQL with the Interview questions covered - (SQL)
Reviews
-
MMariana Vives
Great instructor. Very good examples and clear explanations. I created my own DB to make sure I am not copy/pasting and could reproduce all exercises in a different scenario with different data. Knowledge obtained in this course is easily transferable to distinct scenarios.
-
VVijayendran Sridharan
fantastic trainer, very clear concepts very good approach to train, very good content
-
MMuhammed Roshan
If you are trying to learn sql then its a good to go course. Regarding Pen testing there are no practical examples shown in any of the videos also showing example as IE which was not even existing now which shows that the couse is udpated very long back.
-
PPremshankar Mishra
Great experience