[FreeCoursesOnline.Me] [Pluralsight] Ethical Hacking SQL Injection [FCO]

Torrent Details


[FreeCoursesOnline.Me] [Pluralsight] Ethical Hacking SQL Injection [FCO]

NAME
[FreeCoursesOnline.Me] [Pluralsight] Ethical Hacking SQL Injection [FCO].torrent
CATEGORY
Other
INFOHASH
3ead69572a71f61578a7db7d0126d05e4a5f8ab4
SIZE
919 MB in 94 files
ADDED
Uploaded on 12-01-2020 by our crawler pet called "Spidey".
SWARM
0 seeders & 1 peers
RATING
No votes yet.

Please login to vote for this torrent.


Description

For More Udemy Free Courses >>> https://freetutorials.us/
For more Lynda and other Courses >>> https://www.freecoursesonline.me/
Forum for discussion >>> https://1hack.us/



Created by : Troy Hunt
Language : English
Updated : Sep 16, 2019
Duration : 5h 26m
Subtitle : Included
Torrent Contains : 165 Files, 10 Folders
Course Source : https://www.pluralsight.com/courses/ethical-hacking-sql-injection

About

Pluralsight is not an official partner or accredited training center of EC-Council. This course goes through how to detect SQL injection and identify risks as you to become an ethical hacker with a strong SQL injection understanding.

Description

Pluralsight is not an official partner or accredited training center of EC-Council. Ever since we started connecting websites to databases, SQL injection has been a serious security risk with dire ramifications. The ability for attackers to run arbitrary queries against vulnerable systems can result in data exposure, modification, and in some cases, entire system compromise. SQL injection is classified as the number one risk on the web today due to the "perfect storm" of risk factors. It's very easily discoverable, very easily exploited, and the impact of a successful attack is severe. Add to that the fact that injection risks remain rampant, it's clear how it deserves that number one spot. This course takes you through everything from understanding the SQL syntax used by attackers, basic injection attacks, database discovery and data exfiltration, advanced concepts, and even using injection for network reconnaissance and running system commands. It's everything an ethical hacker needs to know to be effective in identifying the SQL injection risk in target systems. This course is part of the Ethical Hacking Series. http://blog.pluralsight.com/learning-path-ethical-hacking

Level

• Beginner

About Author

Troy Hunt is a Microsoft Regional Director and MVP for Developer Security. He's a regular conference speaker, frequent blogger at troyhunt.com and is the creator of the data breach notification service known as “Have I Been Pwned”.



Discussion

Comments 0

Post Your Comment

Files in this torrent

FILENAMESIZE
0. Websites you may like/How you can help Team-FTU.txt229 B
01 - Why SQL Injection Matters/01 - Overview.en.srt3.8 KB
01 - Why SQL Injection Matters/01 - Overview.mp46.5 MB
01 - Why SQL Injection Matters/02 - The Significance of SQL Injection.en.srt7.7 KB
01 - Why SQL Injection Matters/02 - The Significance of SQL Injection.mp416.7 MB
01 - Why SQL Injection Matters/03 - Executing a SQL Injection Attack.en.srt9.3 KB
01 - Why SQL Injection Matters/03 - Executing a SQL Injection Attack.mp410.3 MB
01 - Why SQL Injection Matters/04 - The Impact of a Successful Attack.en.srt5.6 KB
01 - Why SQL Injection Matters/04 - The Impact of a Successful Attack.mp43.9 MB
01 - Why SQL Injection Matters/05 - SQL Injection in the Wild.en.srt3.5 KB
01 - Why SQL Injection Matters/05 - SQL Injection in the Wild.mp47.8 MB
01 - Why SQL Injection Matters/06 - Summary.en.srt1.9 KB
01 - Why SQL Injection Matters/06 - Summary.mp41.8 MB
02 - Understanding SQL Queries/07 - Overview.en.srt4.8 KB
02 - Understanding SQL Queries/07 - Overview.mp43.7 MB
02 - Understanding SQL Queries/08 - Understanding Structured Query Language.en.srt10.8 KB
02 - Understanding SQL Queries/08 - Understanding Structured Query Language.mp424.2 MB
02 - Understanding SQL Queries/09 - Statement Termination.en.srt3.8 KB
02 - Understanding SQL Queries/09 - Statement Termination.mp47.2 MB
02 - Understanding SQL Queries/10 - Using the SQL Comment Syntax.en.srt3.6 KB
02 - Understanding SQL Queries/10 - Using the SQL Comment Syntax.mp46.8 MB
02 - Understanding SQL Queries/11 - SQL Queries Versus Data.en.srt6.9 KB
02 - Understanding SQL Queries/11 - SQL Queries Versus Data.mp49 MB
02 - Understanding SQL Queries/12 - The Value of Internal Exceptions.en.srt2.7 KB
02 - Understanding SQL Queries/12 - The Value of Internal Exceptions.mp45.3 MB
02 - Understanding SQL Queries/13 - Summary.en.srt3.6 KB
02 - Understanding SQL Queries/13 - Summary.mp43.6 MB
03 - The Mechanics of SQL Injection Attacks/14 - Overview.en.srt4.1 KB
03 - The Mechanics of SQL Injection Attacks/14 - Overview.mp43.1 MB
03 - The Mechanics of SQL Injection Attacks/15 - Types of SQL Injection.en.srt7.5 KB
03 - The Mechanics of SQL Injection Attacks/15 - Types of SQL Injection.mp46.2 MB
03 - The Mechanics of SQL Injection Attacks/16 - The Single Character Injection Test.en.srt11.8 KB
03 - The Mechanics of SQL Injection Attacks/16 - The Single Character Injection Test.mp432.4 MB
03 - The Mechanics of SQL Injection Attacks/17 - Modifying the Query Structure.en.srt13.2 KB
03 - The Mechanics of SQL Injection Attacks/17 - Modifying the Query Structure.mp421.3 MB
03 - The Mechanics of SQL Injection Attacks/18 - Circumventing Website Logins.en.srt10.7 KB
03 - The Mechanics of SQL Injection Attacks/18 - Circumventing Website Logins.mp49.6 MB
03 - The Mechanics of SQL Injection Attacks/19 - Modifying Data and Database Objects.en.srt7.4 KB
03 - The Mechanics of SQL Injection Attacks/19 - Modifying Data and Database Objects.mp48.2 MB
03 - The Mechanics of SQL Injection Attacks/20 - Identifying the Risk in Code.en.srt6.2 KB
03 - The Mechanics of SQL Injection Attacks/20 - Identifying the Risk in Code.mp415.3 MB
03 - The Mechanics of SQL Injection Attacks/21 - Understanding and Detecting Input Sanitization.en.srt6.8 KB
03 - The Mechanics of SQL Injection Attacks/21 - Understanding and Detecting Input Sanitization.mp45.1 MB
03 - The Mechanics of SQL Injection Attacks/22 - Summary.en.srt4.4 KB
03 - The Mechanics of SQL Injection Attacks/22 - Summary.mp44.2 MB
04 - Discovering Schema and Extracting Data/23 - Overview.en.srt4.4 KB
04 - Discovering Schema and Extracting Data/23 - Overview.mp43.7 MB
04 - Discovering Schema and Extracting Data/24 - Understanding the Union Operator.en.srt5.5 KB
04 - Discovering Schema and Extracting Data/24 - Understanding the Union Operator.mp410.1 MB
04 - Discovering Schema and Extracting Data/25 - Executing Union Injection.en.srt18.2 KB
04 - Discovering Schema and Extracting Data/25 - Executing Union Injection.mp442.5 MB
04 - Discovering Schema and Extracting Data/26 - Manual Database Structure Discovery with Error-based Injection.en.srt9.4 KB
04 - Discovering Schema and Extracting Data/26 - Manual Database Structure Discovery with Error-based Injection.mp431.3 MB
04 - Discovering Schema and Extracting Data/27 - Querying System Objects for Schema Discovery.en.srt4.5 KB
04 - Discovering Schema and Extracting Data/27 - Querying System Objects for Schema Discovery.mp410.3 MB
04 - Discovering Schema and Extracting Data/28 - Extracting Schema Details with Union Injection.en.srt7.2 KB
04 - Discovering Schema and Extracting Data/28 - Extracting Schema Details with Union Injection.mp414.5 MB
04 - Discovering Schema and Extracting Data/29 - Enumerating Result Sets with Sub-queries.en.srt8.6 KB
04 - Discovering Schema and Extracting Data/29 - Enumerating Result Sets with Sub-queries.mp417.5 MB
04 - Discovering Schema and Extracting Data/30 - Extracting Schema Details with Error-based Injection .en.srt11.6 KB
04 - Discovering Schema and Extracting Data/30 - Extracting Schema Details with Error-based Injection .mp433.3 MB
04 - Discovering Schema and Extracting Data/31 - Summary.en.srt3.3 KB
04 - Discovering Schema and Extracting Data/31 - Summary.mp43.4 MB
05 - Blind SQL Injection/32 - Overview.en.srt4.3 KB
05 - Blind SQL Injection/32 - Overview.mp42.9 MB
05 - Blind SQL Injection/33 - Basic and Blind Attack Success Criteria.en.srt6.8 KB
05 - Blind SQL Injection/33 - Basic and Blind Attack Success Criteria.mp46.1 MB
05 - Blind SQL Injection/34 - Understanding a Blind Attack.en.srt7 KB
05 - Blind SQL Injection/34 - Understanding a Blind Attack.mp48.2 MB
05 - Blind SQL Injection/35 - Applying Boolean Based Injection.en.srt6.9 KB
05 - Blind SQL Injection/35 - Applying Boolean Based Injection.mp46.7 MB
05 - Blind SQL Injection/36 - Constructing Yes and No Questions for Boolean Based Injection.en.srt13.3 KB
05 - Blind SQL Injection/36 - Constructing Yes and No Questions for Boolean Based Injection.mp422.4 MB
05 - Blind SQL Injection/37 - Enumerating via ASCII Values.en.srt13.9 KB
05 - Blind SQL Injection/37 - Enumerating via ASCII Values.mp418.2 MB
05 - Blind SQL Injection/38 - Where Time Based Injection Makes Sense.en.srt3.5 KB
05 - Blind SQL Injection/38 - Where Time Based Injection Makes Sense.mp49 MB
05 - Blind SQL Injection/39 - Understanding the WAITFOR DELAY Command.en.srt3.6 KB
05 - Blind SQL Injection/39 - Understanding the WAITFOR DELAY Command.mp46.7 MB
05 - Blind SQL Injection/40 - Constructing a Time Based Attack.en.srt15.3 KB
05 - Blind SQL Injection/40 - Constructing a Time Based Attack.mp428.3 MB
05 - Blind SQL Injection/41 - Summary.en.srt3 KB
05 - Blind SQL Injection/41 - Summary.mp42.8 MB
06 - Advanced SQL Injection Concepts/42 - Overview.en.srt4.7 KB
06 - Advanced SQL Injection Concepts/42 - Overview.mp43.3 MB
06 - Advanced SQL Injection Concepts/43 - Database Server Feature Comparison.en.srt11.4 KB
06 - Advanced SQL Injection Concepts/43 - Database Server Feature Comparison.mp423.2 MB
06 - Advanced SQL Injection Concepts/44 - Establishing Account Identity and Rights.en.srt8.1 KB
06 - Advanced SQL Injection Concepts/44 - Establishing Account Identity and Rights.mp418.5 MB
06 - Advanced SQL Injection Concepts/45 - Enumerating Other Databases on the System.en.srt8.9 KB
06 - Advanced SQL Injection Concepts/45 - Enumerating Other Databases on the System.mp420.7 MB
06 - Advanced SQL Injection Concepts/46 - Creating Database Logins.en.srt9.1 KB
06 - Advanced SQL Injection Concepts/46 - Creating Database Logins.mp422.3 MB
06 - Advanced SQL Injection Concepts/47 - Extracting Passwords from SQL Server Hashes.en.srt4.7 KB

Alternative Torrents for 'FreeCoursesOnline.Me Pluralsight Ethical Hacking SQL Injection FCO'.

There are no alternative torrents found.