zhongziso
搜索
zhongziso
首页
首页
功能
磁力转BT
BT转磁力
关于
使用教程
免责声明
磁力助手
Learn SQL +Security(pen) testing from Scratch
magnet:?xt=urn:btih:77544c4295c8ab3b5e052fc5b2a73315f341959a&dn= Learn SQL +Security(pen) testing from Scratch
磁力链接详情
文件列表详情
77544c4295c8ab3b5e052fc5b2a73315f341959a
infohash:
92
文件数量
7.37 GB
文件大小
2021-8-22 20:07
创建日期
2024-12-2 06:54
最后访问
相关分词
Learn
SQL
Security
pen
testing
from
Scratch
1. Course FAQ's/1. Why to learn SQL and Security Testing and how this course is designed.mp4 39.46 MB
10. Understand SQL String functions and Views with examples/1. Importance of views in Database.mp4 43.22 MB
10. Understand SQL String functions and Views with examples/2. views example on Database.mp4 23.34 MB
10. Understand SQL String functions and Views with examples/3. String functions - 1.mp4 105.04 MB
10. Understand SQL String functions and Views with examples/4. String functions - 2.mp4 121.94 MB
10. Understand SQL String functions and Views with examples/5. String functions -3.mp4 45.49 MB
11. Miscelleanous SQL keywords(Union,Intersect,Exist, Case,UnionAll) and their usage/1. Importance of Union and Union All SQL Keyword.mp4 103.3 MB
11. Miscelleanous SQL keywords(Union,Intersect,Exist, Case,UnionAll) and their usage/2. Query to intersect records from two tables.mp4 128.28 MB
11. Miscelleanous SQL keywords(Union,Intersect,Exist, Case,UnionAll) and their usage/3. Exists keyword usage in SQL.mp4 67.34 MB
11. Miscelleanous SQL keywords(Union,Intersect,Exist, Case,UnionAll) and their usage/4. CASE Statement in SQL with example.mp4 136.85 MB
12. Importance of Data constraints for Database Validations/1. NOT NUll constraint -1.mp4 15.73 MB
12. Importance of Data constraints for Database Validations/2. Not Null Constraint Validations and Testing - 2.mp4 50.55 MB
12. Importance of Data constraints for Database Validations/3. Default Constraint Validations and Testing - 3.mp4 33.66 MB
12. Importance of Data constraints for Database Validations/4. Unique Constraint Validations and Testing - 4.mp4 47.66 MB
12. Importance of Data constraints for Database Validations/5. Primary Key Constraint validaton and Testing -5.mp4 79.25 MB
13. Importance of Foreign Key and Primary key with real time examples/1. Importance of Foreign Key constraint in SQL.mp4 47.12 MB
13. Importance of Foreign Key and Primary key with real time examples/2. Understand Foreign key rules and constraints with examples.mp4 242.69 MB
13. Importance of Foreign Key and Primary key with real time examples/3. On DELETE CASCADE Keyword to force rules on Foreign key deletion.mp4 96.14 MB
14. Practise Exercises for Interviews with Solutions/1. Practise Practise Practise !!!.mp4 11.53 MB
15. JDBC Connectivity for Integration with Selenium (Basic Automation knowledge req/1. Jdbc odbc programming-Creating Project.mp4 33.29 MB
15. JDBC Connectivity for Integration with Selenium (Basic Automation knowledge req/2. Creating Database Tables and connecting to Jdbc java code.mp4 122.99 MB
15. JDBC Connectivity for Integration with Selenium (Basic Automation knowledge req/3. Retrieving data from Database with Java code.mp4 46.72 MB
16. SQL Injection/1. What is SQL Injecting.mp4 33.99 MB
16. SQL Injection/2. How to identify SQL loop holes in web application.mp4 105.89 MB
16. SQL Injection/3. Exposing Security loop holes with malcious SQL syntax.mp4 72.95 MB
16. SQL Injection/4. List of urls Pattern which can cause attack with SQL.mp4 21.37 MB
19. Introduction to Security Testing - Phase 2/1. Why security Testing gaining Importance day by day!.mp4 175.93 MB
2. Introduction to SQL/1. Introduction to DataBase.mp4 44.42 MB
2. Introduction to SQL/2. Introduction to SQL and MySQL.mp4 27.09 MB
2. Introduction to SQL/3. Downloading MySQL server with workbench.mp4 101.12 MB
2. Introduction to SQL/4. Overview of SQL Editor with basic features.mp4 20.74 MB
20. Security Testing Basic Terminologies/1. What is Http and Https.mp4 45.75 MB
20. Security Testing Basic Terminologies/2. How can we avoid Man in middle attacks.mp4 41.37 MB
20. Security Testing Basic Terminologies/3. Http Methods overview in talking to servers.mp4 60.15 MB
20. Security Testing Basic Terminologies/4. Fiddler Demo- Monitoring Network traffic.mp4 14.97 MB
20. Security Testing Basic Terminologies/5. Understanding Fiddler to intercept requests.mp4 83.6 MB
21. XSS - Cross Site Scripting Vulnerability Testing/1. What is XSS How it can damage Web sites.mp4 44.38 MB
21. XSS - Cross Site Scripting Vulnerability Testing/2. Detecting XSS Vulnerability for Websites - 1.mp4 103.77 MB
21. XSS - Cross Site Scripting Vulnerability Testing/3. Detecting XSS Vulnerability for Websites - 2.mp4 71.18 MB
21. XSS - Cross Site Scripting Vulnerability Testing/4. ByPassing Client Validation to perform XSS.mp4 69.39 MB
21. XSS - Cross Site Scripting Vulnerability Testing/5. Encoding all the inputs to avoid Attacks.mp4 182.32 MB
21. XSS - Cross Site Scripting Vulnerability Testing/6. Types of Attack - Reflected XSS.mp4 79.61 MB
21. XSS - Cross Site Scripting Vulnerability Testing/7. Types of Attack - Persisistence XSS.mp4 150.21 MB
21. XSS - Cross Site Scripting Vulnerability Testing/8. How to handle cross site scripting in IE browser.mp4 60.94 MB
22. Importance of Cookies and their role in Security/1. What are cookies and where are they stored.mp4 87.65 MB
22. Importance of Cookies and their role in Security/2. Session cookie sensitive data Threats.mp4 112.37 MB
22. Importance of Cookies and their role in Security/3. How can we stop Cookies hijacking.mp4 72.02 MB
22. Importance of Cookies and their role in Security/4. Methods to Prevent cookie steal -Secure Attribute.mp4 210.93 MB
22. Importance of Cookies and their role in Security/5. Preventing cookies steal -Http Attribute flag.mp4 139.91 MB
22. Importance of Cookies and their role in Security/6. Domain and path attribute to restrict cookies.mp4 142.07 MB
22. Importance of Cookies and their role in Security/7. Setting Timeperiod for Sessions- Security Safety Tip.mp4 78.78 MB
23. Session Hijacking and Cross Site Forgery Attacks/1. What is CSRF How can it cause threat.mp4 45.3 MB
23. Session Hijacking and Cross Site Forgery Attacks/2. Session Hijacking with illegal requests.mp4 58.08 MB
23. Session Hijacking and Cross Site Forgery Attacks/3. Avoid Cross SIte forgeries with Token Mechanisim.mp4 82.97 MB
23. Session Hijacking and Cross Site Forgery Attacks/4. Checklist for Pen Testers to check CSRF Attacks.mp4 47.81 MB
24. Parameter Tampering to steal sensitive data/1. Different sources to intercept requests.mp4 23.42 MB
24. Parameter Tampering to steal sensitive data/2. Importance of having Server side Validations.mp4 15.57 MB
24. Parameter Tampering to steal sensitive data/3. Intercepting requests with fiddler tool.mp4 115.52 MB
25. Account Security/1. Steps to be taken for Password setting.mp4 37.31 MB
25. Account Security/2. List of Hacking Passwords and Precautions which need to be taken.mp4 22.73 MB
25. Account Security/3. Sources of Attacking Passwords.mp4 63.71 MB
25. Account Security/4. Best Practices to be followed in securing Account.mp4 38.6 MB
25. Account Security/5. Bruteforce attack handler Mechanism.mp4 68.91 MB
3. CRUD operations on Database with Practical examples/1. creating Database and pointing to it.mp4 8.08 MB
3. CRUD operations on Database with Practical examples/2. Creating Tables in database.mp4 69.28 MB
3. CRUD operations on Database with Practical examples/3. Inserting records into Table.mp4 93.83 MB
3. CRUD operations on Database with Practical examples/4. Retrieving records from the Table.mp4 32.6 MB
4. Altering Table Schema operations/1. Adding and modifying records in a table.mp4 51.23 MB
4. Altering Table Schema operations/2. Deleting records and droping database.mp4 13.6 MB
4. Altering Table Schema operations/3. Updating rows in a table.mp4 102.19 MB
4. Altering Table Schema operations/4. Modifying operations example.mp4 92.64 MB
5. SQL Logical operators to retrieve Data/1. Select Distinct keyword in queris.mp4 82.02 MB
5. SQL Logical operators to retrieve Data/2. SQL WHERE command usage.mp4 116.95 MB
5. SQL Logical operators to retrieve Data/3. Logical operators on Queries AND OR - 1.mp4 122.67 MB
5. SQL Logical operators to retrieve Data/4. Logical operators 'In' 'Between'- 2.mp4 115.7 MB
6. Regular expressions in writing Smart SQL Queries/1. Regular expressions Introduction.mp4 93.58 MB
6. Regular expressions in writing Smart SQL Queries/2. Wild cards usage in Qeuries -1.mp4 37.74 MB
6. Regular expressions in writing Smart SQL Queries/3. SORT by usage in Queries.mp4 28.7 MB
7. Deeper Understanding on GroupBy, Aggregate functions with practical examples/1. Importance of Group By in SQL.mp4 204.99 MB
7. Deeper Understanding on GroupBy, Aggregate functions with practical examples/2. Combination of GroupBy and SQL functions(Min,Max,Avg).mp4 101.5 MB
7. Deeper Understanding on GroupBy, Aggregate functions with practical examples/3. Usage of Having keyword with GroupBy and Aggregate functions.mp4 177.67 MB
7. Deeper Understanding on GroupBy, Aggregate functions with practical examples/4. Difference between Having and Where keyword and when to use them.mp4 194.97 MB
7. Deeper Understanding on GroupBy, Aggregate functions with practical examples/5. Practise Exercises on GroupBy,Having,Where and Aggregate functions keyword -1.mp4 127.53 MB
7. Deeper Understanding on GroupBy, Aggregate functions with practical examples/6. Practise Exercises on GroupBy,Having,Where and Aggregate functions keyword- 2.mp4 151.34 MB
8. Building SQL Sub queries with examples/1. SubQueries syntax and usage.mp4 24.05 MB
8. Building SQL Sub queries with examples/2. SubQueries Example.mp4 41.73 MB
9. SQL Joins, Inner Joins, Outer joins, Left&Right joins with Interview questions/1. SQL Joins usage and its advantages.mp4 28.38 MB
9. SQL Joins, Inner Joins, Outer joins, Left&Right joins with Interview questions/2. SQL Joins Example.mp4 77.93 MB
9. SQL Joins, Inner Joins, Outer joins, Left&Right joins with Interview questions/3. Relation on subqueries and Joins.mp4 127.1 MB
9. SQL Joins, Inner Joins, Outer joins, Left&Right joins with Interview questions/4. Practical examples on Joins and subqueries.mp4 148.01 MB
9. SQL Joins, Inner Joins, Outer joins, Left&Right joins with Interview questions/5. Left and Right joins importance in SQL.mp4 123.46 MB
9. SQL Joins, Inner Joins, Outer joins, Left&Right joins with Interview questions/6. Practical example on Inner joins, Left join, Right Join.mp4 239.96 MB
其他位置