Learn SQL +Security(pen) testing from Scratch

seeders: 4 leechers: 20 updated: 4 years ago
Added 4 years ago by Coursesghar 3.08k in Other
Downloaded 11 times.
1337x.to extranet.torrentbay.st
Learn SQL +Security(pen) testing from Scratch

Torrent Contents Size: 7.37 GB

Learn SQL +Security(pen) testing from Scratch
▼ show more 197 files
!!! More Courses !!!.txt
TXT
1.14 KB
1. Course FAQ's
1. Why to learn SQL and Security Testing and how this course is designed-en_US.srt
SRT
8.33 KB
1. Why to learn SQL and Security Testing and how this course is designed.mp4
MP4
39.46 MB
Please Note.html
HTML
303 B
10. Understand SQL String functions and Views with examples
1. Importance of views in Database-en_US.srt
SRT
9.2 KB
1. Importance of views in Database.mp4
MP4
43.22 MB
2. views example on Database-en_US.srt
SRT
8.01 KB
2. views example on Database.mp4
MP4
23.34 MB
3. String functions - 1-en_US.srt
SRT
10.63 KB
3. String functions - 1.mp4
MP4
105.04 MB
4. String functions - 2-en_US.srt
SRT
9.78 KB
4. String functions - 2.mp4
MP4
121.94 MB
5. String functions -3-en_US.srt
SRT
7.48 KB
5. String functions -3.mp4
MP4
45.49 MB
SQL glossary on discussed topics.html
HTML
856 B
11. Miscelleanous SQL keywords(Union,Intersect,Exist, Case,UnionAll) and their usage
1. Importance of Union and Union All SQL Keyword-en_US.srt
SRT
8.83 KB
1. Importance of Union and Union All SQL Keyword.mp4
MP4
103.3 MB
2. Query to intersect records from two tables-en_US.srt
SRT
11.83 KB
2. Query to intersect records from two tables.mp4
MP4
128.28 MB
3. Exists keyword usage in SQL-en_US.srt
SRT
6.84 KB
3. Exists keyword usage in SQL.mp4
MP4
67.34 MB
4. CASE Statement in SQL with example-en_US.srt
SRT
13.33 KB
4. CASE Statement in SQL with example.mp4
MP4
136.85 MB
SQL GLossary.html
HTML
838 B
12. Importance of Data constraints for Database Validations
1. NOT NUll constraint -1-en_US.srt
SRT
6.92 KB
1. NOT NUll constraint -1.mp4
MP4
15.73 MB
2. Not Null Constraint Validations and Testing - 2-en_US.srt
SRT
8.55 KB
2. Not Null Constraint Validations and Testing - 2.mp4
MP4
50.55 MB
3. Default Constraint Validations and Testing - 3-en_US.srt
SRT
7.85 KB
3. Default Constraint Validations and Testing - 3.mp4
MP4
33.66 MB
4. Unique Constraint Validations and Testing - 4-en_US.srt
SRT
6.48 KB
4. Unique Constraint Validations and Testing - 4.mp4
MP4
47.66 MB
5. Primary Key Constraint validaton and Testing -5-en_US.srt
SRT
11.79 KB
5. Primary Key Constraint validaton and Testing -5.mp4
MP4
79.25 MB
SQL glossary on discussed topics.html
HTML
388 B
13. Importance of Foreign Key and Primary key with real time examples
1. Importance of Foreign Key constraint in SQL-en_US.srt
SRT
12.67 KB
1. Importance of Foreign Key constraint in SQL.mp4
MP4
47.12 MB
2. Understand Foreign key rules and constraints with examples-en_US.srt
SRT
16.46 KB
2. Understand Foreign key rules and constraints with examples.mp4
MP4
242.69 MB
3. On DELETE CASCADE Keyword to force rules on Foreign key deletion-en_US.srt
SRT
11.3 KB
3. On DELETE CASCADE Keyword to force rules on Foreign key deletion.mp4
MP4
96.14 MB
SQL Glossary.html
HTML
1.3 KB
14. Practise Exercises for Interviews with Solutions
1. Practise Practise Practise !!!-en_US.srt
SRT
6.2 KB
1. Practise Practise Practise !!!.mp4
MP4
11.53 MB
Practise ExerciseInterview Questions- 1.html
HTML
4.17 KB
Practise ExerciseInterview Questions- 2.html
HTML
5.15 KB
Solutions for Exercise - 1.html
HTML
1.83 KB
Solutions for Exercise -2.html
HTML
1.85 KB
15. JDBC Connectivity for Integration with Selenium (Basic Automation knowledge req
1. Jdbc odbc programming-Creating Project-en_US.srt
SRT
7.88 KB
1. Jdbc odbc programming-Creating Project.mp4
MP4
33.29 MB
2. Creating Database Tables and connecting to Jdbc java code-en_US.srt
SRT
19.08 KB
2. Creating Database Tables and connecting to Jdbc java code.mp4
MP4
122.99 MB
3. Retrieving data from Database with Java code-en_US.srt
SRT
7.11 KB
3. Retrieving data from Database with Java code.mp4
MP4
46.72 MB
jdbc code download.html
HTML
1.36 KB
16. SQL Injection
1. What is SQL Injecting-en_US.srt
SRT
8.31 KB
1. What is SQL Injecting.mp4
MP4
33.99 MB
2. How to identify SQL loop holes in web application-en_US.srt
SRT
14.77 KB
2. How to identify SQL loop holes in web application.mp4
MP4
105.89 MB
3. Exposing Security loop holes with malcious SQL syntax-en_US.srt
SRT
10.83 KB
3. Exposing Security loop holes with malcious SQL syntax.mp4
MP4
72.95 MB
4. List of urls Pattern which can cause attack with SQL-en_US.srt
SRT
9.81 KB
4. List of urls Pattern which can cause attack with SQL.mp4
MP4
21.37 MB
Material for reference.html
HTML
1.13 KB
17. Complete Unix Material
Unix for Beginners- 2.html
HTML
45 B
18. Important Note
Important Note.html
HTML
316 B
19. Introduction to Security Testing - Phase 2
1. Why security Testing gaining Importance day by day!-en_US.srt
SRT
11.03 KB
1. Why security Testing gaining Importance day by day!.mp4
MP4
175.93 MB
2. Introduction to SQL
1. Introduction to DataBase-en_US.srt
SRT
12.61 KB
1. Introduction to DataBase.mp4
MP4
44.42 MB
2. Introduction to SQL and MySQL-en_US.srt
SRT
8.26 KB
2. Introduction to SQL and MySQL.mp4
MP4
27.09 MB
3. Downloading MySQL server with workbench-en_US.srt
SRT
10.16 KB
3. Downloading MySQL server with workbench.mp4
MP4
101.12 MB
4. Overview of SQL Editor with basic features-en_US.srt
SRT
6.94 KB
4. Overview of SQL Editor with basic features.mp4
MP4
20.74 MB
SQL basic Material for reference.html
HTML
42 B
20. Security Testing Basic Terminologies
1. What is Http and Https-en_US.srt
SRT
12.16 KB
1. What is Http and Https.mp4
MP4
45.75 MB
2. How can we avoid Man in middle attacks-en_US.srt
SRT
8.3 KB
2. How can we avoid Man in middle attacks.mp4
MP4
41.37 MB
3. Http Methods overview in talking to servers-en_US.srt
SRT
11.4 KB
3. Http Methods overview in talking to servers.mp4
MP4
60.15 MB
4. Fiddler Demo- Monitoring Network traffic-en_US.srt
SRT
3.13 KB
4. Fiddler Demo- Monitoring Network traffic.mp4
MP4
14.97 MB
5. Understanding Fiddler to intercept requests-en_US.srt
SRT
9.17 KB
5. Understanding Fiddler to intercept requests.mp4
MP4
83.6 MB
Material for Reference.html
HTML
3.42 KB
21. XSS - Cross Site Scripting Vulnerability Testing
1. What is XSS How it can damage Web sites-en_US.srt
SRT
10.94 KB
1. What is XSS How it can damage Web sites.mp4
MP4
44.38 MB
2. Detecting XSS Vulnerability for Websites - 1-en_US.srt
SRT
8.56 KB
2. Detecting XSS Vulnerability for Websites - 1.mp4
MP4
103.77 MB
3. Detecting XSS Vulnerability for Websites - 2-en_US.srt
SRT
7.11 KB
3. Detecting XSS Vulnerability for Websites - 2.mp4
MP4
71.18 MB
4. ByPassing Client Validation to perform XSS-en_US.srt
SRT
10.88 KB
4. ByPassing Client Validation to perform XSS.mp4
MP4
69.39 MB
5. Encoding all the inputs to avoid Attacks-en_US.srt
SRT
11.97 KB
5. Encoding all the inputs to avoid Attacks.mp4
MP4
182.32 MB
6. Types of Attack - Reflected XSS-en_US.srt
SRT
9.54 KB
6. Types of Attack - Reflected XSS.mp4
MP4
79.61 MB
7. Types of Attack - Persisistence XSS-en_US.srt
SRT
10.98 KB
7. Types of Attack - Persisistence XSS.mp4
MP4
150.21 MB
8. How to handle cross site scripting in IE browser-en_US.srt
SRT
12.15 KB
8. How to handle cross site scripting in IE browser.mp4
MP4
60.94 MB
Material for Reference.html
HTML
2.48 KB
22. Importance of Cookies and their role in Security
1. What are cookies and where are they stored-en_US.srt
SRT
9.8 KB
1. What are cookies and where are they stored.mp4
MP4
87.65 MB
2. Session cookie sensitive data Threats-en_US.srt
SRT
11.65 KB
2. Session cookie sensitive data Threats.mp4
MP4
112.37 MB
3. How can we stop Cookies hijacking-en_US.srt
SRT
8.88 KB
3. How can we stop Cookies hijacking.mp4
MP4
72.02 MB
4. Methods to Prevent cookie steal -Secure Attribute-en_US.srt
SRT
15.93 KB
4. Methods to Prevent cookie steal -Secure Attribute.mp4
MP4
210.93 MB
5. Preventing cookies steal -Http Attribute flag-en_US.srt
SRT
13.48 KB
5. Preventing cookies steal -Http Attribute flag.mp4
MP4
139.91 MB
6. Domain and path attribute to restrict cookies-en_US.srt
SRT
14.45 KB
6. Domain and path attribute to restrict cookies.mp4
MP4
142.07 MB
7. Setting Timeperiod for Sessions- Security Safety Tip-en_US.srt
SRT
7.66 KB
7. Setting Timeperiod for Sessions- Security Safety Tip.mp4
MP4
78.78 MB
Material for Reference.html
HTML
5.22 KB
23. Session Hijacking and Cross Site Forgery Attacks
1. What is CSRF How can it cause threat-en_US.srt
SRT
14.86 KB
1. What is CSRF How can it cause threat.mp4
MP4
45.3 MB
2. Session Hijacking with illegal requests-en_US.srt
SRT
11.75 KB
2. Session Hijacking with illegal requests.mp4
MP4
58.08 MB
3. Avoid Cross SIte forgeries with Token Mechanisim-en_US.srt
SRT
9.89 KB
3. Avoid Cross SIte forgeries with Token Mechanisim.mp4
MP4
82.97 MB
4. Checklist for Pen Testers to check CSRF Attacks-en_US.srt
SRT
10.67 KB
4. Checklist for Pen Testers to check CSRF Attacks.mp4
MP4
47.81 MB
Material for Reference.html
HTML
2.48 KB
24. Parameter Tampering to steal sensitive data
1. Different sources to intercept requests-en_US.srt
SRT
6.88 KB
1. Different sources to intercept requests.mp4
MP4
23.42 MB
2. Importance of having Server side Validations-en_US.srt
SRT
7.27 KB
2. Importance of having Server side Validations.mp4
MP4
15.57 MB
3. Intercepting requests with fiddler tool-en_US.srt
SRT
7.76 KB
3. Intercepting requests with fiddler tool.mp4
MP4
115.52 MB
Material for Reference.html
HTML
512 B
25. Account Security
1. Steps to be taken for Password setting-en_US.srt
SRT
11.06 KB
1. Steps to be taken for Password setting.mp4
MP4
37.31 MB
2. List of Hacking Passwords and Precautions which need to be taken-en_US.srt
SRT
7.06 KB
2. List of Hacking Passwords and Precautions which need to be taken.mp4
MP4
22.73 MB
3. Sources of Attacking Passwords-en_US.srt
SRT
10.43 KB
3. Sources of Attacking Passwords.mp4
MP4
63.71 MB
4. Best Practices to be followed in securing Account-en_US.srt
SRT
12.76 KB
4. Best Practices to be followed in securing Account.mp4
MP4
38.6 MB
5. Bruteforce attack handler Mechanism-en_US.srt
SRT
16.17 KB
5. Bruteforce attack handler Mechanism.mp4
MP4
68.91 MB
Bonus Lecture- Discount coupons for other courses.html
HTML
10.77 KB
Material for Reference.html
HTML
1.11 KB
3. CRUD operations on Database with Practical examples
1. creating Database and pointing to it-en_US.srt
SRT
5.31 KB
1. creating Database and pointing to it.mp4
MP4
8.08 MB
2. Creating Tables in database-en_US.srt
SRT
8.67 KB
2. Creating Tables in database.mp4
MP4
69.28 MB
3. Inserting records into Table-en_US.srt
SRT
7.77 KB
3. Inserting records into Table.mp4
MP4
93.83 MB
4. Retrieving records from the Table-en_US.srt
SRT
6.63 KB
4. Retrieving records from the Table.mp4
MP4
32.6 MB
SQL commands glossary on discussed Topics.html
HTML
768 B
4. Altering Table Schema operations
1. Adding and modifying records in a table-en_US.srt
SRT
7.15 KB
1. Adding and modifying records in a table.mp4
MP4
51.23 MB
2. Deleting records and droping database-en_US.srt
SRT
5.73 KB
2. Deleting records and droping database.mp4
MP4
13.6 MB
3. Updating rows in a table-en_US.srt
SRT
7.89 KB
3. Updating rows in a table.mp4
MP4
102.19 MB
4. Modifying operations example-en_US.srt
SRT
6.57 KB
4. Modifying operations example.mp4
MP4
92.64 MB
SQL Glossary on discussed topics.html
HTML
691 B
5. SQL Logical operators to retrieve Data
1. Select Distinct keyword in queris-en_US.srt
SRT
7.17 KB
1. Select Distinct keyword in queris.mp4
MP4
82.02 MB
2. SQL WHERE command usage-en_US.srt
SRT
9.46 KB
2. SQL WHERE command usage.mp4
MP4
116.95 MB
3. Logical operators on Queries AND OR - 1-en_US.srt
SRT
6.81 KB
3. Logical operators on Queries AND OR - 1.mp4
MP4
122.67 MB
4. Logical operators 'In' 'Between'- 2-en_US.srt
SRT
9.29 KB
4. Logical operators 'In' 'Between'- 2.mp4
MP4
115.7 MB
6. Regular expressions in writing Smart SQL Queries
1. Regular expressions Introduction-en_US.srt
SRT
8.11 KB
1. Regular expressions Introduction.mp4
MP4
93.58 MB
2. Wild cards usage in Qeuries -1-en_US.srt
SRT
8.88 KB
2. Wild cards usage in Qeuries -1.mp4
MP4
37.74 MB
3. SORT by usage in Queries-en_US.srt
SRT
6.17 KB
3. SORT by usage in Queries.mp4
MP4
28.7 MB
SQL glossary on discussed topics.html
HTML
1.01 KB
7. Deeper Understanding on GroupBy, Aggregate functions with practical examples
1. Importance of Group By in SQL-en_US.srt
SRT
13.77 KB
1. Importance of Group By in SQL.mp4
MP4
204.99 MB
2. Combination of GroupBy and SQL functions(Min,Max,Avg)-en_US.srt
SRT
8.28 KB
2. Combination of GroupBy and SQL functions(Min,Max,Avg).mp4
MP4
101.5 MB
3. Usage of Having keyword with GroupBy and Aggregate functions-en_US.srt
SRT
12.31 KB
3. Usage of Having keyword with GroupBy and Aggregate functions.mp4
MP4
177.67 MB
4. Difference between Having and Where keyword and when to use them-en_US.srt
SRT
12.48 KB
4. Difference between Having and Where keyword and when to use them.mp4
MP4
194.97 MB
5. Practise Exercises on GroupBy,Having,Where and Aggregate functions keyword -1-en_US.srt
SRT
8.65 KB
5. Practise Exercises on GroupBy,Having,Where and Aggregate functions keyword -1.mp4
MP4
127.53 MB
6. Practise Exercises on GroupBy,Having,Where and Aggregate functions keyword- 2-en_US.srt
SRT
9.51 KB
6. Practise Exercises on GroupBy,Having,Where and Aggregate functions keyword- 2.mp4
MP4
151.34 MB
SQL glossary on discussed topics.html
HTML
1.44 KB
groupby.csv
CSV
1.38 KB
8. Building SQL Sub queries with examples
1. SubQueries syntax and usage-en_US.srt
SRT
8.83 KB
1. SubQueries syntax and usage.mp4
MP4
24.05 MB
2. SubQueries Example-en_US.srt
SRT
6.28 KB
2. SubQueries Example.mp4
MP4
41.73 MB
9. SQL Joins, Inner Joins, Outer joins, Left&Right joins with Interview questions
1. SQL Joins usage and its advantages-en_US.srt
SRT
6.15 KB
1. SQL Joins usage and its advantages.mp4
MP4
28.38 MB
2. SQL Joins Example-en_US.srt
SRT
8.09 KB
2. SQL Joins Example.mp4
MP4
77.93 MB
3. Relation on subqueries and Joins-en_US.srt
SRT
10.64 KB
3. Relation on subqueries and Joins.mp4
MP4
127.1 MB
4. Practical examples on Joins and subqueries-en_US.srt
SRT
11.85 KB
4. Practical examples on Joins and subqueries.mp4
MP4
148.01 MB
5. Left and Right joins importance in SQL-en_US.srt
SRT
12.1 KB
5. Left and Right joins importance in SQL.mp4
MP4
123.46 MB
6. Practical example on Inner joins, Left join, Right Join-en_US.srt
SRT
17.83 KB
6. Practical example on Inner joins, Left join, Right Join.mp4
MP4
239.96 MB
logo.jpg
JPG
72.11 KB

Description

Related Torrents

Location

Trackers

Tracker name
udp://opentor.org:2710/announce
udp://tracker.torrent.eu.org:451/announce
udp://open.stealth.si:80/announce
udp://ipv4.tracker.harry.lu:80/announce
udp://tracker.uw0.xyz:6969/announce
udp://tracker.dler.org:6969/announce
udp://9.rarbg.com:2870/announce
udp://www.torrent.eu.org:451/announce
udp://tracker2.dler.com:80/announce
Torrent hash: