Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Learn SQL in Practical + DataBase Testing from Scratch
Course FAQ's
Why to learn SQL and Security Testing? and how this course is designed (6:55)
Introduction to SQL
Introduction to DataBase (9:55)
Introduction to SQL and MySQL (6:27)
Downloading MySQL server with workbench (7:29)
Overview of SQL Editor with basic features (5:26)
SQL basic Material for reference
CRUD operations on Database with Practical examples
creating Database and pointing to it (4:47)
Creating Tables in database (8:01)
Inserting records into Table (7:55)
Retrieving records from the Table (6:22)
SQL commands glossary on discussed Topics
Altering Table Schema operations
Adding and modifying records in a table (6:57)
Deleting records and droping database (4:48)
Updating rows in a table (7:32)
Modifying operations example (5:55)
SQL Glossary on discussed topics
SQL Logical operators to retrieve Data
Select Distinct keyword in queris (6:50)
SQL WHERE command usage (9:27)
Logical operators on Queries AND OR - 1 (7:07)
Logical operators 'In' 'Between'- 2 (8:37)
Regular expressions in writing Smart SQL Queries
Regular expressions Introduction (7:18)
Wild cards usage in Qeuries -1 (8:04)
SORT by usage in Queries (5:23)
SQL glossary on discussed topics
Deeper Understanding on GroupBy, Aggregate functions with practical examples
Importance of Group By in SQL (12:38)
Combination of GroupBy and SQL functions(Min,Max,Avg) (7:49)
Usage of Having keyword with GroupBy and Aggregate functions (11:24)
Difference between Having and Where keyword and when to use them (11:21)
Practise Exercises on GroupBy,Having,Where and Aggregate functions keyword -1 (7:53)
Practise Exercises on GroupBy,Having,Where and Aggregate functions keyword- 2 (9:31)
SQL glossary on discussed topics
Building SQL Sub queries with examples
SubQueries syntax and usage (8:08)
SubQueries Example (6:07)
SQL Joins, Inner Joins, Outer joins, Left&Right joins with Interview questions
SQL Joins usage and its advantages (5:46)
SQL Joins Example (7:30)
Relation on subqueries and Joins (9:34)
Practical examples on Joins and subqueries (10:25)
Left and Right joins importance in SQL (10:33)
Practical example on Inner joins, Left join, Right Join (16:15)
Understand SQL String functions and Views with examples
Importance of views in Database (7:55)
views example on Database (7:18)
String functions - 1 (9:23)
String functions -3 (6:11)
String functions - 2 (8:48)
SQL glossary on discussed topics
Miscelleanous SQL keywords(Union,Intersect,Exist, Case,UnionAll) and their usage
Importance of Union and Union All SQL Keyword (8:02)
Query to intersect records from two tables (10:12)
Exists keyword usage in SQL (6:16)
CASE Statement in SQL with example (12:39)
SQL GLossary
Importance of Data constraints for Database Validations
NOT NUll constraint -1 (6:12)
Not Null Constraint Validations and Testing - 2 (8:10)
Default Constraint Validations and Testing - 3 (6:28)
Unique Constraint Validations and Testing - 4 (5:43)
Primary Key Constraint validaton and Testing -5 (9:45)
SQL glossary on discussed topics
Importance of Foreign Key and Primary key with real time examples
Importance of Foreign Key constraint in SQL (10:21)
Understand Foreign key rules and constraints with examples (15:28)
On DELETE CASCADE Keyword to force rules on Foreign key deletion (10:33)
SQL Glossary
Practise Exercises for Interviews with Solutions
Practise Practise Practise !!! (4:54)
Practise Exercise/Interview Questions- 1
Practise Exercise/Interview Questions- 2
Solutions for Exercise - 1
Solutions for Exercise -2
JDBC Connectivity for Integration with Selenium (Basic Automation knowledge required)
Jdbc odbc programming-Creating Project (7:03)
Creating Database Tables and connecting to Jdbc java code (16:48)
Retrieving data from Database with Java code (6:46)
jdbc code download
SQL Injection
What is SQL Injection (7:32)
How to identify SQL loop holes in web application (13:19)
Exposing Security loop holes with malcious SQL syntax (9:20)
List of urls Pattern which can cause attack with SQL (7:34)
Material for reference
Complete Unix Material
Unix for Beginners- 2
Important Note
Important Note
Introduction to Security Testing - Phase 2
Why security Testing gaining Importance day by day!
Security Testing Basic Terminologies
What is Http and Https? (9:58)
How can we avoid Man in middle attacks? (6:52)
Http Methods overview in talking to servers (9:28)
Fiddler Demo- Monitoring Network traffic (3:19)
Understanding Fiddler to intercept requests (7:31)
Material for Reference
XSS - Cross Site Scripting Vulnerability Testing
What is XSS? How it can damage Web sites (9:49)
Detecting XSS Vulnerability for Websites - 1 (8:14)
Detecting XSS Vulnerability for Websites - 2 (6:14)
ByPassing Client Validation to perform XSS (9:08)
Encoding all the inputs to avoid Attacks (10:02)
Types of Attack - Reflected XSS (8:30)
Types of Attack - Persisistence XSS (9:58)
How to handle cross site scripting in IE browser (10:22)
Material for Reference
Importance of Cookies and their role in Security
What are cookies and where are they stored (8:48)
Session cookie sensitive data Threats (9:43)
How can we stop Cookies hijacking (7:41)
Methods to Prevent cookie steal -Secure Attribute (13:56)
Preventing cookies steal -Http Attribute flag (11:44)
Domain and path attribute to restrict cookies (11:53)
Setting Timeperiod for Sessions- Security Safety Tip (6:01)
Material for Reference
Teach online with
Unique Constraint Validations and Testing - 4
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock