The course is part of this learning path
This course focuses on SQL vulnerabilities which are some of the most common and dangerous vulnerabilities that you will come across when you carry out web pentesting or bug bounty hunting. We'll start by covering the fundamentals of SQL and how a database is created using it. You'll also learn about SQL comments to insert values, get their values back or change them, delete them, or edit them.
Hi, starting from this section, we're going to be focusing on SQL vulnerabilities or 'ess-cue-ell' vulnerabilities however you may want to pronounce this, and this is one of the most popular and most dangerous vulnerabilities that you will come across when you do web pentesting or bug bounty hunting. So, we're going to start learning the 'ess-cue-ell' or SQL fundamentals in this section. We're going to see how actually is a database created using SQL. How we can use SQL comments to insert values, get their values back or change them or delete them or edit them. We're going to talk about all of this stuff. It will be SQL crash course, then we will dive into the SQL Injections. But before we go on to that, you're going to have to learn about this stuff. So, if you're ready, let's get started.
Atil is an instructor at Bogazici University, where he graduated back in 2010. He is also co-founder of Academy Club, which provides training, and Pera Games, which operates in the mobile gaming industry.