Study any time, from any device.

Injection Attacks

Learn what you need to know about injecting code or SQL queries into vulnerable applications in order to circumvent access controls. Includes vocabulary and examples.

2 videos  //  19 minutes of training

Course description

If you can sneak malicious code into an application, then you have your way in. This course focuses on two such attacks: SQL (Structured Query Language) injection and code injection, aimed at vulnerable input areas in data-driven or Web applications. Take a look at circumventing authentication, error-based and blind SQL injection, inserting and retrieving data and more. Includes vocabulary and example scenarios.

Course syllabus

SQL InjectionDuration: 14:30

Code InjectionDuration: 4:43

Meet the author

Infosec

LinkedIn

At Infosec, we believe knowledge is the most powerful tool in the fight against cybercrime. We help IT and security professionals advance their careers with a full regimen of certification and skills training. We also empower all employees with security awareness training to stay cybersecure at work and home. Driven by smart people wanting to do good, Infosec educates entire organizations on how to defend themselves from cybercrime. That’s what we do every day — equipping everyone with the latest security skills so the good guys win.

You're in good company

"Comparing Infosec to other vendors is like comparing apples to oranges. My instructor was hands-down the best I’ve had." 

James Coyle

FireEye, Inc.

"I knew Infosec could tell me what to expect on the exam and what topics to focus on most."

Julian Tang

Chief Information Officer

"I’ve taken five boot camps with Infosec and all my instructors have been great."

Jeffrey Coa

Information Security Systems Officer