From the course: CCNA Cybersecurity (200-201) v1.2 Cert Prep
Unlock this course with a free trial
Join today to access over 25,300 courses taught by industry experts.
SQL injection attacks
From the course: CCNA Cybersecurity (200-201) v1.2 Cert Prep
SQL injection attacks
(soft music) - [Instructor] A very common attack is a SQL injection attack. And it's very popular because it's very easy to execute or at least to attempt to execute. And in this video, we'll consider how a SQL injection attack works. First, let's consider what a relational database is because SQL is a programming language that works on a relational database. But a relational database is a collection of data that is structured into different tables. And these tables, much like a spreadsheet, have rows. In the database world though, those rows are called records. And these tables have columns, which in a database are called fields, and there is a defined relationship between the tables. So imagine we're working with a massive data set. Maybe it's customer information. We might have credit card information. We might have medical records. We can have all sorts of data stored amongst these tables in a relational database. And the sheer amount of data might make it impractical for us to…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
-
(Locked)
Module 2: Threat detection and surveillance1m 13s
-
(Locked)
Attack surfaces1m 53s
-
(Locked)
Monitoring sources7m 8s
-
(Locked)
Data visibility comparison6m 25s
-
(Locked)
Categories of data types2m 54s
-
(Locked)
Denial-of-service (DoS) attacks5m 43s
-
Man-in-the-middle attacks9m 39s
-
(Locked)
Protocol-based attacks8m 12s
-
(Locked)
SQL injection attacks7m 25s
-
(Locked)
Cross-site scripting attacks5m 19s
-
(Locked)
Command injection attacks1m 26s
-
(Locked)
Social engineering attacks7m 43s
-
(Locked)
AI-based social engineering attacks2m 7s
-
(Locked)
Malware and ransomware attacks4m 22s
-
(Locked)
Buffer overflow attacks1m 49s
-
(Locked)
Command-and-control (C2) attacks2m 11s
-
(Locked)
Comparison of obfuscation techniques2m 3s
-
(Locked)
Encryption with digital certificates4m 21s
-
(Locked)
Digital certificate components7m 4s
-
(Locked)
-
-
-
-
-