SQL injection vulnerabilities are some of the most well-known and common vulnerabilities in existence. This course describes what they are, how they work, how they can be exploited and steps that can be taken to fix them. The case study featuring Starbucks demonstrates how a small mistake can have big consequences.
Introduction to SQL InjectionDuration: 2:13
This video provides an introduction to the SQL injection course.
Introduction to DatabasesDuration: 4:10
This video covers the fundamentals of databases.
SQL Injection VulnerabilitiesDuration: 7:45
This video describes how SQL injection vulnerabilities can make an application vulnerable to attack.
Exploiting SQL InjectionDuration: 6:19
This video describes how SQL injection vulnerabilities can be exploited by an attacker.
SQL Injection Case StudyDuration: 5:32
This video describes a case study of an application containing an SQL injection vulnerability.
SQL Injection MitigationsDuration: 9:40
This video describes mitigations for SQL injection vulnerabilities.
SQL Injection DemoDuration: 7:32
This video demonstrates exploitation of an SQL injection vulnerability.
Meet the author
Howard Poston is a cybersecurity researcher with a background in blockchain, cryptography and malware analysis. He has a master's degree in Cyber Operations from the Air Force Institute of Technology and two years of experience in cybersecurity research and development at Sandia National Labs. He currently works as a freelance consultant providing training and content creation for cyber and blockchain security. He can be reached by email at firstname.lastname@example.org or via his website at https://www.howardposton.com.
You're in good company
"Comparing Infosec to other vendors is like comparing apples to oranges. My instructor was hands-down the best I’ve had."
"I knew Infosec could tell me what to expect on the exam and what topics to focus on most."
"I’ve taken five boot camps with Infosec and all my instructors have been great."