Publisher:
Skillsoft
Course Series:
Certified Ethical Hacker (CEH) v12
Specialties:
IT
WhatsNew
Course Description:
Many web applications store data in a back-end database and the data is then retrieved as the end user requests it from the front end. This process can allow for end-user injection of SQL queries, revealing sensitive data to the unauthorized attacker. In this course, you'll learn about SQL injection, including attack types, tools, security controls, and defense evasion techniques. Next, you'll explore error-based SQLi and how to test for and exploit this common SQLi vulnerability. SQL injections can be used to gain access to sensitive information or even allow access into a remote system, but they aren't always easily executed. To complete this course, you'll learn about blind-based SQLi methods and how to use them to access sensitive information on a remote system. This course is one in a series that helps to prepare you for the Certified Ethical Hacker v12 (312-50) exam.
Other courses in this series:
CEH v12: AD Enumeration, Mimikatz, and Pivoting Techniques
CEH v12: App Layer Attacks, Botnets, and DoS Countermeasures
CEH v12: Buffer Overflows, Privilege Escalation, and System Access
CEH v12: Cloud Computing, Containers, Hacking, and Security Controls
CEH v12: Cryptography, Algorithms, Implementations, and Tools
CEH v12: Cyber Kill Chain, TTPs, Behaviors, and Threat Hunting
CEH v12: Cybersecurity Concepts, Attacks, and Information Warfare
CEH v12: DoS, DDoS, Volumetric, and Protocol Attacks
CEH v12: Fileless Malware, Malware Analysis, and Countermeasures
CEH v12: Footprinting and Social Engineering Recon and Countermeasures
CEH v12: Footprinting, Google Dorks, Search Engines, and Subdomains
CEH v12: Hacking Methodology, MITRE ATT&CK Framework, and Diamond Model
CEH v12: Hijacking Concepts and Countermeasures
CEH v12: IDOR Attacks, File Inclusion Attacks, Web APIs, and Webhooks
CEH v12: Incident Management, ML, AI, and Regulations
CEH v12: Intrusion Detection and Prevention, Firewalls, and Honeypots
CEH v12: IoT Threats, Vulnerabilities, Attack Tools, and Countermeasures
CEH v12: Malware, Threats, Trojans, and Viruses
CEH v12: Mobile Hacking, OS Security, and Device Management
CEH v12: NetBIOS, SMB, SNMP, and LDAP Enumeration
CEH v12: Network Scanning, TCP, Host Discovery, and Port/Service Scanning
CEH v12: Nmap IDLE IPID, UDP, and SCTP Scans
CEH v12: Nmap TCP Scans
CEH v12: NTP, NFS, SMTP, and FTP Enumeration
CEH v12: Operational Technology Concepts, Attack Tools, and Countermeasures
CEH v12: Passwords Attacks, Extraction, and Cracking
CEH v12: PKI, Cryptanalysis, and Attack Countermeasures
CEH v12: Recon Tools and Tactics
CEH v12: Risk Management, Cyber Threat Intelligence, and Threat Modeling
CEH v12: Scan Optimization, OS Identification, and IDS/Firewall Evasion
CEH v12: Sniffing and Poisoning
CEH v12: Social Engineering, Insider Threats, and Identity Theft
CEH v12: SQL Injection and SQLMap
CEH v12: SQL Injection Concepts and Attacks
CEH v12: Steganography and Avoiding Detection
CEH v12: Vulnerability Assessment Types, Models, Tools, and Reports
CEH v12: Vulnerability Assessment, Management, and Classification
CEH v12: Web App Hacking Methodology, CSRF Attacks, and Input Filter Evasion
CEH v12: Web Application Attacks and Vulnerabilities
CEH v12: Web Server Hacking, Attacks, and Attack Methodologies
CEH v12: Windows Authentication
CEH v12: Wireless Concepts, Threats, and Hacking Tools
CEH v12: Wireless Hacking and Countermeasures