Mastering Database Reconnaissance and Exploitation
Mastering Database Reconnaissance and Exploitation
Advanced
5( 186 Reviews )
4 Hrs
Vulnerability Assessment and Pentesting
Learn how to identify, enumerate, and exploit SQL databases and NoSQL databases to PWN modern web applications.
Learn how to identify, enumerate, and exploit SQL databases and NoSQL databases to PWN modern web applications.
Upgrade to Pro +
Gain hands-on experience, enhance your expertise, and achieve mastery in cybersecurity with our Pro plans.
Reviews
5
186 reviews
Average Course Rating
5 stars
73%4 stars
26%3 stars
1%2 stars
0%1 stars
1%Top Student Reviews
Chris Gardiner
A very good overview treatment of SQLi, including mitigations and NoSQL attacks which gets far less coverage.
Gisele Parvedy
I've learned a lot of things! Thanks!
Mesut Ucar
X
SAYANTAN
Good
agung
course is comprehensive
Keshant Kumar Uikey
Good
Related Courses
Short Course
CCNA - Understanding Routers and Switches
Security Architecture and Operations
A comprehensive guide to understanding the in-depth functioning of routers and switches for the preparation of CCNA Exam.
Short Course
CISSP Certification Domains 5, 6, 7, and 8 Video Training
Cybersecurity
This course is ideal for individuals who desire to pass the Information Systems Security Professional CISSP Certification Exam and want to gain more insight and knowledge around IT, Information, and Cyber Security from a management/senior leader perspective.
Short Course
Learn Ethical Hacking by Hacking Real Websites Legally
Vulnerability Assessment and Pentesting
Fun way to learn ethical hacking by playing online hacking games - hacking real websites legally
Short Course
Cybersecurity for Blockchain from Ground Up
Cybersecurity
Implement, identify, and manage security in your Blockchain applications