种子简介
种子名称:
Learn SQL +Security(pen) testing from Scratch
文件类型:
视频
文件数目:
92个文件
文件大小:
7.37 GB
收录时间:
2021-8-22 20:07
已经下载:
3次
资源热度:
218
最近下载:
2024-12-18 02:29
下载BT种子文件
下载Torrent文件(.torrent)
立即下载
磁力链接下载
magnet:?xt=urn:btih:77544c4295c8ab3b5e052fc5b2a73315f341959a&dn= Learn SQL +Security(pen) testing from Scratch
复制链接到迅雷、QQ旋风进行下载,或者使用百度云离线下载。
喜欢这个种子的人也喜欢
种子包含的文件
Learn SQL +Security(pen) testing from Scratch.torrent
1. Course FAQ's/1. Why to learn SQL and Security Testing and how this course is designed.mp439.46MB
10. Understand SQL String functions and Views with examples/1. Importance of views in Database.mp443.22MB
10. Understand SQL String functions and Views with examples/2. views example on Database.mp423.34MB
10. Understand SQL String functions and Views with examples/3. String functions - 1.mp4105.04MB
10. Understand SQL String functions and Views with examples/4. String functions - 2.mp4121.94MB
10. Understand SQL String functions and Views with examples/5. String functions -3.mp445.49MB
11. Miscelleanous SQL keywords(Union,Intersect,Exist, Case,UnionAll) and their usage/1. Importance of Union and Union All SQL Keyword.mp4103.3MB
11. Miscelleanous SQL keywords(Union,Intersect,Exist, Case,UnionAll) and their usage/2. Query to intersect records from two tables.mp4128.28MB
11. Miscelleanous SQL keywords(Union,Intersect,Exist, Case,UnionAll) and their usage/3. Exists keyword usage in SQL.mp467.34MB
11. Miscelleanous SQL keywords(Union,Intersect,Exist, Case,UnionAll) and their usage/4. CASE Statement in SQL with example.mp4136.85MB
12. Importance of Data constraints for Database Validations/1. NOT NUll constraint -1.mp415.73MB
12. Importance of Data constraints for Database Validations/2. Not Null Constraint Validations and Testing - 2.mp450.55MB
12. Importance of Data constraints for Database Validations/3. Default Constraint Validations and Testing - 3.mp433.66MB
12. Importance of Data constraints for Database Validations/4. Unique Constraint Validations and Testing - 4.mp447.66MB
12. Importance of Data constraints for Database Validations/5. Primary Key Constraint validaton and Testing -5.mp479.25MB
13. Importance of Foreign Key and Primary key with real time examples/1. Importance of Foreign Key constraint in SQL.mp447.12MB
13. Importance of Foreign Key and Primary key with real time examples/2. Understand Foreign key rules and constraints with examples.mp4242.69MB
13. Importance of Foreign Key and Primary key with real time examples/3. On DELETE CASCADE Keyword to force rules on Foreign key deletion.mp496.14MB
14. Practise Exercises for Interviews with Solutions/1. Practise Practise Practise !!!.mp411.53MB
15. JDBC Connectivity for Integration with Selenium (Basic Automation knowledge req/1. Jdbc odbc programming-Creating Project.mp433.29MB
15. JDBC Connectivity for Integration with Selenium (Basic Automation knowledge req/2. Creating Database Tables and connecting to Jdbc java code.mp4122.99MB
15. JDBC Connectivity for Integration with Selenium (Basic Automation knowledge req/3. Retrieving data from Database with Java code.mp446.72MB
16. SQL Injection/1. What is SQL Injecting.mp433.99MB
16. SQL Injection/2. How to identify SQL loop holes in web application.mp4105.89MB
16. SQL Injection/3. Exposing Security loop holes with malcious SQL syntax.mp472.95MB
16. SQL Injection/4. List of urls Pattern which can cause attack with SQL.mp421.37MB
19. Introduction to Security Testing - Phase 2/1. Why security Testing gaining Importance day by day!.mp4175.93MB
2. Introduction to SQL/1. Introduction to DataBase.mp444.42MB
2. Introduction to SQL/2. Introduction to SQL and MySQL.mp427.09MB
2. Introduction to SQL/3. Downloading MySQL server with workbench.mp4101.12MB
2. Introduction to SQL/4. Overview of SQL Editor with basic features.mp420.74MB
20. Security Testing Basic Terminologies/1. What is Http and Https.mp445.75MB
20. Security Testing Basic Terminologies/2. How can we avoid Man in middle attacks.mp441.37MB
20. Security Testing Basic Terminologies/3. Http Methods overview in talking to servers.mp460.15MB
20. Security Testing Basic Terminologies/4. Fiddler Demo- Monitoring Network traffic.mp414.97MB
20. Security Testing Basic Terminologies/5. Understanding Fiddler to intercept requests.mp483.6MB
21. XSS - Cross Site Scripting Vulnerability Testing/1. What is XSS How it can damage Web sites.mp444.38MB
21. XSS - Cross Site Scripting Vulnerability Testing/2. Detecting XSS Vulnerability for Websites - 1.mp4103.77MB
21. XSS - Cross Site Scripting Vulnerability Testing/3. Detecting XSS Vulnerability for Websites - 2.mp471.18MB
21. XSS - Cross Site Scripting Vulnerability Testing/4. ByPassing Client Validation to perform XSS.mp469.39MB
21. XSS - Cross Site Scripting Vulnerability Testing/5. Encoding all the inputs to avoid Attacks.mp4182.32MB
21. XSS - Cross Site Scripting Vulnerability Testing/6. Types of Attack - Reflected XSS.mp479.61MB
21. XSS - Cross Site Scripting Vulnerability Testing/7. Types of Attack - Persisistence XSS.mp4150.21MB
21. XSS - Cross Site Scripting Vulnerability Testing/8. How to handle cross site scripting in IE browser.mp460.94MB
22. Importance of Cookies and their role in Security/1. What are cookies and where are they stored.mp487.65MB
22. Importance of Cookies and their role in Security/2. Session cookie sensitive data Threats.mp4112.37MB
22. Importance of Cookies and their role in Security/3. How can we stop Cookies hijacking.mp472.02MB
22. Importance of Cookies and their role in Security/4. Methods to Prevent cookie steal -Secure Attribute.mp4210.93MB
22. Importance of Cookies and their role in Security/5. Preventing cookies steal -Http Attribute flag.mp4139.91MB
22. Importance of Cookies and their role in Security/6. Domain and path attribute to restrict cookies.mp4142.07MB
22. Importance of Cookies and their role in Security/7. Setting Timeperiod for Sessions- Security Safety Tip.mp478.78MB
23. Session Hijacking and Cross Site Forgery Attacks/1. What is CSRF How can it cause threat.mp445.3MB
23. Session Hijacking and Cross Site Forgery Attacks/2. Session Hijacking with illegal requests.mp458.08MB
23. Session Hijacking and Cross Site Forgery Attacks/3. Avoid Cross SIte forgeries with Token Mechanisim.mp482.97MB
23. Session Hijacking and Cross Site Forgery Attacks/4. Checklist for Pen Testers to check CSRF Attacks.mp447.81MB
24. Parameter Tampering to steal sensitive data/1. Different sources to intercept requests.mp423.42MB
24. Parameter Tampering to steal sensitive data/2. Importance of having Server side Validations.mp415.57MB
24. Parameter Tampering to steal sensitive data/3. Intercepting requests with fiddler tool.mp4115.52MB
25. Account Security/1. Steps to be taken for Password setting.mp437.31MB
25. Account Security/2. List of Hacking Passwords and Precautions which need to be taken.mp422.73MB
25. Account Security/3. Sources of Attacking Passwords.mp463.71MB
25. Account Security/4. Best Practices to be followed in securing Account.mp438.6MB
25. Account Security/5. Bruteforce attack handler Mechanism.mp468.91MB
3. CRUD operations on Database with Practical examples/1. creating Database and pointing to it.mp48.08MB
3. CRUD operations on Database with Practical examples/2. Creating Tables in database.mp469.28MB
3. CRUD operations on Database with Practical examples/3. Inserting records into Table.mp493.83MB
3. CRUD operations on Database with Practical examples/4. Retrieving records from the Table.mp432.6MB
4. Altering Table Schema operations/1. Adding and modifying records in a table.mp451.23MB
4. Altering Table Schema operations/2. Deleting records and droping database.mp413.6MB
4. Altering Table Schema operations/3. Updating rows in a table.mp4102.19MB
4. Altering Table Schema operations/4. Modifying operations example.mp492.64MB
5. SQL Logical operators to retrieve Data/1. Select Distinct keyword in queris.mp482.02MB
5. SQL Logical operators to retrieve Data/2. SQL WHERE command usage.mp4116.95MB
5. SQL Logical operators to retrieve Data/3. Logical operators on Queries AND OR - 1.mp4122.67MB
5. SQL Logical operators to retrieve Data/4. Logical operators 'In' 'Between'- 2.mp4115.7MB
6. Regular expressions in writing Smart SQL Queries/1. Regular expressions Introduction.mp493.58MB
6. Regular expressions in writing Smart SQL Queries/2. Wild cards usage in Qeuries -1.mp437.74MB
6. Regular expressions in writing Smart SQL Queries/3. SORT by usage in Queries.mp428.7MB
7. Deeper Understanding on GroupBy, Aggregate functions with practical examples/1. Importance of Group By in SQL.mp4204.99MB
7. Deeper Understanding on GroupBy, Aggregate functions with practical examples/2. Combination of GroupBy and SQL functions(Min,Max,Avg).mp4101.5MB
7. Deeper Understanding on GroupBy, Aggregate functions with practical examples/3. Usage of Having keyword with GroupBy and Aggregate functions.mp4177.67MB
7. Deeper Understanding on GroupBy, Aggregate functions with practical examples/4. Difference between Having and Where keyword and when to use them.mp4194.97MB
7. Deeper Understanding on GroupBy, Aggregate functions with practical examples/5. Practise Exercises on GroupBy,Having,Where and Aggregate functions keyword -1.mp4127.53MB
7. Deeper Understanding on GroupBy, Aggregate functions with practical examples/6. Practise Exercises on GroupBy,Having,Where and Aggregate functions keyword- 2.mp4151.34MB
8. Building SQL Sub queries with examples/1. SubQueries syntax and usage.mp424.05MB
8. Building SQL Sub queries with examples/2. SubQueries Example.mp441.73MB
9. SQL Joins, Inner Joins, Outer joins, Left&Right joins with Interview questions/1. SQL Joins usage and its advantages.mp428.38MB
9. SQL Joins, Inner Joins, Outer joins, Left&Right joins with Interview questions/2. SQL Joins Example.mp477.93MB
9. SQL Joins, Inner Joins, Outer joins, Left&Right joins with Interview questions/3. Relation on subqueries and Joins.mp4127.1MB
9. SQL Joins, Inner Joins, Outer joins, Left&Right joins with Interview questions/4. Practical examples on Joins and subqueries.mp4148.01MB
9. SQL Joins, Inner Joins, Outer joins, Left&Right joins with Interview questions/5. Left and Right joins importance in SQL.mp4123.46MB
9. SQL Joins, Inner Joins, Outer joins, Left&Right joins with Interview questions/6. Practical example on Inner joins, Left join, Right Join.mp4239.96MB