SQL and Security Testing are Additional skills which every software Engineer need to have irrespective of their role in Project. And this course fulfills the gap by teaching both these topics and also gives you an edge compared to other Engineers at your work .And of course these are one of the common skills which are tested in every Software Engineer Interview.
SQL and Security Testing are Additional skills which every software Engineer need to have irrespective of their role in Project. And this course fulfills the gap by teaching both these topics and also gives you an edge compared to other Engineers at your work .And of course these are one of the common skills which are tested in every Software Engineer Interview.
What make this course special for beginners?"No more Boring slides or Definitions. I will write every SQL query before you in lecture and teach every topic needed to master in SQL with Practical examples
And also This Tutorial will give all the weapons you needed to investigate and unlock the Security Holes in the Web application with powerful Penetration testing approach
Course lectures are conceptually driven with root level explanations and bring you to the level where you can write any kind of SQL query and detect any kind of security bugs in the application
This course covers :
MYSQL :
Introduction to SQL MySQLOverview Start up commands to Setup Database andTables Database testing to validate Schema Altering Table Schema operations Queries to retrieve Data Logical operators on Queries Wild cards usage in Queries SQL Functions with real time scenarios Importance of Group By in SQL Advanced SQL Concepts SubQueries syntax and usage SQL Joins usage and its advantages Importance of views in Database SQL String functions Dataconstraints with DataBase Testing perspective Practise Exercises for Interviews with Solutions SQL glossary on discussed topics
Security Testing :
Course Contents: Basics of Security Testing Terminologies involved in Security Domain Top OWASP principles Cross site Scrpiting Xss examples Cookies Importance Danger with stealing of cookies Session Hijacking Cross site forgery Attacks Parameter Tampering Methods to Intercept requests Account Management Password security guidelines Brute force mechanism Importance of Client side validations
OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.
Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.
Find this site helpful? Tell a friend about us.
We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.
Your purchases help us maintain our catalog and keep our servers humming without ads.
Thank you for supporting OpenCourser.