Oreilly - Ethical Hacking: Hacking Databases
by Chad Russell | Publisher: Stone River eLearning | Release Date: October 2017 | ISBN: 100000006A0718
This course is for beginners and IT pros looking to get certified and land an entry level Cyber Security position paying upwards of six figures! Each chapter closes with exercises putting your new learned skills into practical use immediately. You will start by understand network anonymity by using tools such as Tor, Tortilla and Proxy Chains.
- Hacking Databases
- Database Security 00:20:11
- First Order SQL Injection 00:01:30
- Bodgeit Store – ZAP Data Collection for SQLMap 00:02:24
- Shodan 00:02:41
- MySQL Lab Buildout 00:07:23
- MySQL Security Architecture and Exploits 00:16:32
- MySQL Lockdown 00:35:08
- Operating System Hardening 00:07:44
- Big Data Security 00:17:33
TO MAC USERS: If RAR password doesn't work, use this archive program:
RAR Expander 0.8.5 Beta 4 and extract password protected files without error.
TO WIN USERS: If RAR password doesn't work, use this archive program:
Latest Winrar and extract password protected files without error.