Information Technology
Hands on Training icon
Hands On Training
Hands on Training icon

Ethical Hacking: SQL Injection

Course Cover
compare button icon

Course Features

icon

Duration

5.62 hours

icon

Delivery Method

Online

icon

Available on

Downloadable Courses

icon

Accessibility

Mobile, Desktop, Laptop

icon

Language

English

icon

Subtitles

English

icon

Level

Beginner

icon

Effort

5 hours per week

icon

Teaching Type

Self Paced

icon

Video Content

5.62 hours

Course Description

Pluralsight does not have an accreditation or official partnership with any of these training centers. EC-Council. Since the introduction of websites that connect to databases, SQL injection has been a major security threat with serious ramifications. An attacker's ability to execute arbitrary queries on vulnerable systems could lead to data exposure, modification, or even system compromise. Due to the "perfect storm of risk factors", SQL injection is the most dangerous web threat. It is easy to find and exploit, and it can have severe consequences if an attack succeeds. It's also worth mentioning that injection risks are still very common. This course covers everything you need to know about SQL syntax, attackers, data discovery, data exfiltration, advanced concepts and injection for network reconnaissance. This course covers everything an ethical hacker should know in order to identify the SQL injection risk in target system systems. This course is part of the Ethical Hacking Series. http://blog.pluralsight.com/learning-path-ethical-hacking

Course Overview

projects-img

International Faculty

projects-img

Case Based Learning

projects-img

Post Course Interactions

projects-img

Case Studies,Instructor-Moderated Discussions

projects-img

Case Studies, Captstone Projects

Skills You Will Gain

What You Will Learn

Why SQL Injection Matters

Understanding SQL Queries

The Mechanics of SQL Injection Attacks

Discovering Schema and Extracting Data

Blind SQL Injection

Advanced SQL Injection Concepts

Defending Against Attacks

Evasion Techniques

Course Instructors

Author Image

Dale Meredith

Instructor

Dale Meredith has been a Certified Ethical Hacker/Instructor EC-Council for the past 15 years, and Microsoft Certified Trainer for over 20 years. Dale also has an additional 7 years of senior IT mana...
Course Cover