IT Professional Curricula Internet and Network Technologies Solution Area Security Solutions Certified Ethical Hacker (CEH) v10 (Update)
Explore SQL Injection attacks and how they can be used to inject, retrieve, or bypass authentication mechanisms. This course will help prepare for the 312-50: Certified Ethical Hacker v10 exam. Watch this video and learn how to identify SQL Injection risks and explain how to avoid SQL Injection. Gain a high-level view of how Transact-SQL statements work, and finally, you will learn how to review SQL injection exercise examples.
Objectives |
---|
Certified Ethical Hacker - CEHv10: SQL Injection
|