~Get Your Course Here !/1 - Course FAQ's/Why to learn SQL and Security Testing and how this course is designed.mp411.61MB
~Get Your Course Here !/10 - Understand SQL String functions and Views with examples/Importance of views in Database.mp424.45MB
~Get Your Course Here !/10 - Understand SQL String functions and Views with examples/String functions - 1.mp437.21MB
~Get Your Course Here !/10 - Understand SQL String functions and Views with examples/String functions - 2.mp420.11MB
~Get Your Course Here !/10 - Understand SQL String functions and Views with examples/String functions -3.mp423.72MB
~Get Your Course Here !/10 - Understand SQL String functions and Views with examples/views example on Database.mp431.06MB
~Get Your Course Here !/11 - Miscellaneous SQL keywords (Union, Intersect, Exist, Case, UnionAll) and their usage/CASE Statement in SQL with example.mp428.52MB
~Get Your Course Here !/11 - Miscellaneous SQL keywords (Union, Intersect, Exist, Case, UnionAll) and their usage/Exists keyword usage in SQL.mp415.87MB
~Get Your Course Here !/11 - Miscellaneous SQL keywords (Union, Intersect, Exist, Case, UnionAll) and their usage/Importance of Union and Union All SQL Keyword.mp417.24MB
~Get Your Course Here !/11 - Miscellaneous SQL keywords (Union, Intersect, Exist, Case, UnionAll) and their usage/Query to intersect records from two tables.mp427.71MB
~Get Your Course Here !/12 - Importance of Data constraints for Database Validations/Default Constraint Validations and Testing - 3.mp424.61MB
~Get Your Course Here !/12 - Importance of Data constraints for Database Validations/NOT NUll constraint -1.mp417.77MB
~Get Your Course Here !/12 - Importance of Data constraints for Database Validations/Not Null Constraint Validations and Testing - 2.mp431.07MB
~Get Your Course Here !/12 - Importance of Data constraints for Database Validations/Primary Key Constraint validation and Testing -5.mp440.83MB
~Get Your Course Here !/12 - Importance of Data constraints for Database Validations/Unique Constraint Validations and Testing - 4.mp423.56MB
~Get Your Course Here !/13 - Importance of Foreign Key and Primary key with real time examples/Importance of Foreign Key constraint in SQL.mp423.86MB
~Get Your Course Here !/13 - Importance of Foreign Key and Primary key with real time examples/On DELETE CASCADE Keyword to force rules on Foreign key deletion.mp435.68MB
~Get Your Course Here !/13 - Importance of Foreign Key and Primary key with real time examples/Understand Foreign key rules and constraints with examples.mp443.79MB
~Get Your Course Here !/14 - Practise Exercises for Interviews with Solutions/Practise Practise Practise !!!.mp416.16MB
~Get Your Course Here !/15 - JDBC Connectivity for Integration with Selenium (Basic Automation knowledge req/Creating Database Tables and connecting to Jdbc java code.mp463.04MB
~Get Your Course Here !/15 - JDBC Connectivity for Integration with Selenium (Basic Automation knowledge req/Jdbc odbc programming-Creating Project.mp426.42MB
~Get Your Course Here !/15 - JDBC Connectivity for Integration with Selenium (Basic Automation knowledge req/Retrieving data from Database with Java code.mp419.3MB
~Get Your Course Here !/16 - SQL Injection/Exposing Security loop holes with malcious SQL syntax.mp436.1MB
~Get Your Course Here !/16 - SQL Injection/How to identify SQL loopholes in web application.mp451.22MB
~Get Your Course Here !/16 - SQL Injection/List of urls Pattern which can cause attack with SQL.mp416.71MB
~Get Your Course Here !/16 - SQL Injection/What is SQL Injecting.mp424.88MB
~Get Your Course Here !/17 - Introduction to Security Testing - Phase 2/Why security Testing gaining Importance day by day!.mp436.23MB
~Get Your Course Here !/18 - Security Testing Basic Terminologies/Fiddler Demo- Monitoring Network traffic.mp413.11MB
~Get Your Course Here !/18 - Security Testing Basic Terminologies/How can we avoid Man in middle attacks.mp425.75MB
~Get Your Course Here !/18 - Security Testing Basic Terminologies/Http Methods overview in talking to servers.mp439.09MB
~Get Your Course Here !/18 - Security Testing Basic Terminologies/Understanding Fiddler to intercept requests.mp429.77MB
~Get Your Course Here !/18 - Security Testing Basic Terminologies/What is Http and Https.mp426.75MB
~Get Your Course Here !/19 - XSS - Cross Site Scripting Vulnerability Testing/ByPassing Client Validation to perform XSS.mp434.98MB
~Get Your Course Here !/19 - XSS - Cross Site Scripting Vulnerability Testing/Detecting XSS Vulnerability for Websites - 1.mp432.47MB
~Get Your Course Here !/19 - XSS - Cross Site Scripting Vulnerability Testing/Detecting XSS Vulnerability for Websites - 2.mp424.75MB
~Get Your Course Here !/19 - XSS - Cross Site Scripting Vulnerability Testing/Encoding all the inputs to avoid Attacks.mp438.73MB
~Get Your Course Here !/19 - XSS - Cross Site Scripting Vulnerability Testing/How to handle cross site scripting in IE browser.mp440.85MB
~Get Your Course Here !/19 - XSS - Cross Site Scripting Vulnerability Testing/Types of Attack - Persisistence XSS.mp438.24MB
~Get Your Course Here !/19 - XSS - Cross Site Scripting Vulnerability Testing/Types of Attack - Reflected XSS.mp433.58MB
~Get Your Course Here !/19 - XSS - Cross Site Scripting Vulnerability Testing/What is XSS How it can damage Web sites.mp429.02MB
~Get Your Course Here !/2 - Introduction to SQL/Downloading MySQL server with workbench.mp431.68MB
~Get Your Course Here !/2 - Introduction to SQL/Introduction to DataBase.mp420.78MB
~Get Your Course Here !/2 - Introduction to SQL/Introduction to SQL and MySQL.mp425.86MB
~Get Your Course Here !/2 - Introduction to SQL/Overview of SQL Editor with basic features.mp415.53MB
~Get Your Course Here !/20 - Importance of Cookies and their role in Security/Domain and path attribute to restrict cookies.mp448.78MB
~Get Your Course Here !/20 - Importance of Cookies and their role in Security/How can we stop Cookies hijacking.mp434.42MB
~Get Your Course Here !/20 - Importance of Cookies and their role in Security/Methods to Prevent cookie steal -Secure Attribute.mp453.41MB
~Get Your Course Here !/20 - Importance of Cookies and their role in Security/Preventing cookies steal -Http Attribute flag.mp447.49MB
~Get Your Course Here !/20 - Importance of Cookies and their role in Security/Session cookie sensitive data Threats.mp431.29MB
~Get Your Course Here !/20 - Importance of Cookies and their role in Security/Setting Timeperiod for Sessions- Security Safety Tip.mp423.61MB
~Get Your Course Here !/20 - Importance of Cookies and their role in Security/What are cookies and where are they stored.mp431.09MB
~Get Your Course Here !/21 - Session Hijacking and Cross Site Forgery Attacks/Avoid Cross Site forgeries with Token Mechanism.mp429.58MB
~Get Your Course Here !/21 - Session Hijacking and Cross Site Forgery Attacks/Checklist for Pen Testers to check CSRF Attacks.mp431.45MB
~Get Your Course Here !/21 - Session Hijacking and Cross Site Forgery Attacks/Session Hijacking with illegal requests.mp435.36MB
~Get Your Course Here !/21 - Session Hijacking and Cross Site Forgery Attacks/What is CSRF How can it cause threat.mp430.73MB
~Get Your Course Here !/22 - Parameter Tampering to steal sensitive data/Different sources to intercept requests.mp417.59MB
~Get Your Course Here !/22 - Parameter Tampering to steal sensitive data/Importance of having Server-side Validations.mp412.71MB
~Get Your Course Here !/22 - Parameter Tampering to steal sensitive data/Intercepting requests with fiddler tool.mp427.86MB
~Get Your Course Here !/23 - Account Security/Best Practices to be followed in securing Account.mp424.66MB
~Get Your Course Here !/23 - Account Security/Bruteforce attack handler Mechanism.mp441.43MB
~Get Your Course Here !/23 - Account Security/List of Hacking Passwords and Precautions which need to be taken.mp422.04MB
~Get Your Course Here !/23 - Account Security/Sources of Attacking Passwords.mp421.92MB
~Get Your Course Here !/23 - Account Security/Steps to be taken for Password setting.mp425.21MB
~Get Your Course Here !/3 - CRUD operations on Database with Practical examples/Creating Tables in database.mp427.54MB
~Get Your Course Here !/3 - CRUD operations on Database with Practical examples/Inserting records into Table.mp429.85MB
~Get Your Course Here !/3 - CRUD operations on Database with Practical examples/Retrieving records from the Table.mp423.44MB
~Get Your Course Here !/3 - CRUD operations on Database with Practical examples/creating Database and pointing to it.mp411.84MB
~Get Your Course Here !/4 - Altering Table Schema operations/Adding and modifying records in a table.mp424.16MB
~Get Your Course Here !/4 - Altering Table Schema operations/Deleting records and dropping database.mp417.92MB
~Get Your Course Here !/4 - Altering Table Schema operations/Modifying operations example.mp424.8MB
~Get Your Course Here !/4 - Altering Table Schema operations/Updating rows in a table.mp430.09MB
~Get Your Course Here !/5 - SQL Logical operators to retrieve Data/Logical operators 'In' 'Between'- 2.mp437.72MB
~Get Your Course Here !/5 - SQL Logical operators to retrieve Data/Logical operators on Queries AND OR - 1.mp429.53MB
~Get Your Course Here !/5 - SQL Logical operators to retrieve Data/SQL WHERE command usage.mp437.45MB
~Get Your Course Here !/5 - SQL Logical operators to retrieve Data/Select Distinct keyword in queris.mp427.02MB
~Get Your Course Here !/6 - Regular expressions in writing Smart SQL Queries/Regular expressions Introduction.mp413.41MB
~Get Your Course Here !/6 - Regular expressions in writing Smart SQL Queries/SORT by usage in Queries.mp422.4MB
~Get Your Course Here !/6 - Regular expressions in writing Smart SQL Queries/Wild cards usage in Queries -1.mp428.66MB
~Get Your Course Here !/7 - Deeper Understanding on GroupBy, Aggregate functions with practical examples/Combination of GroupBy and SQL functions (Min,Max,Avg).mp418.97MB
~Get Your Course Here !/7 - Deeper Understanding on GroupBy, Aggregate functions with practical examples/Difference between Having and Where keyword and when to use them.mp430.27MB
~Get Your Course Here !/7 - Deeper Understanding on GroupBy, Aggregate functions with practical examples/Importance of Group By in SQL.mp432.37MB
~Get Your Course Here !/7 - Deeper Understanding on GroupBy, Aggregate functions with practical examples/Practise Exercises on GroupBy,Having,Where and Aggregate functions keyword -1.mp418.9MB
~Get Your Course Here !/7 - Deeper Understanding on GroupBy, Aggregate functions with practical examples/Practise Exercises on GroupBy,Having,Where and Aggregate functions keyword- 2.mp429.83MB
~Get Your Course Here !/7 - Deeper Understanding on GroupBy, Aggregate functions with practical examples/Usage of Having keyword with GroupBy and Aggregate functions.mp425.22MB
~Get Your Course Here !/8 - Building SQL Sub queries with examples/SubQueries Example.mp426.68MB
~Get Your Course Here !/8 - Building SQL Sub queries with examples/SubQueries syntax and usage.mp432.01MB
~Get Your Course Here !/9 - SQL Joins, Inner Joins, Outer joins, Left & Right joins with Interview questions/Left and Right joins importance in SQL.mp429.17MB
~Get Your Course Here !/9 - SQL Joins, Inner Joins, Outer joins, Left & Right joins with Interview questions/Practical example on Inner joins, Left join, Right Join.mp448.5MB
~Get Your Course Here !/9 - SQL Joins, Inner Joins, Outer joins, Left & Right joins with Interview questions/Practical examples on Joins and subqueries.mp420.61MB
~Get Your Course Here !/9 - SQL Joins, Inner Joins, Outer joins, Left & Right joins with Interview questions/Relation on subqueries and Joins.mp437.57MB
~Get Your Course Here !/9 - SQL Joins, Inner Joins, Outer joins, Left & Right joins with Interview questions/SQL Joins Example.mp430.54MB
~Get Your Course Here !/9 - SQL Joins, Inner Joins, Outer joins, Left & Right joins with Interview questions/SQL Joins usage and its advantages.mp423MB