Complete Ethical Hacking Series: Hacking Databases
5.0 (1 rating)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
6 students enrolled
Wishlisted Wishlist

Please confirm that you want to add Complete Ethical Hacking Series: Hacking Databases to your Wishlist.

Add to Wishlist

Complete Ethical Hacking Series: Hacking Databases

Complete Ethical Hacking Series (CEHv9): Hacking Databases
5.0 (1 rating)
Instead of using a simple lifetime average, Udemy calculates a course's star rating by considering a number of different factors such as the number of ratings, the age of ratings, and the likelihood of fraudulent ratings.
6 students enrolled
Created by Chad Russell
Last updated 7/2017
English
Curiosity Sale
Current price: $10 Original price: $20 Discount: 50% off
30-Day Money-Back Guarantee
Includes:
  • 2 hours on-demand video
  • Full lifetime access
  • Access on mobile and TV
  • Certificate of Completion
What Will I Learn?
  • Hack and secure leading commercial and open source database platforms.
View Curriculum
Requirements
  • Students should have a working understanding of TCP/IP and networking concepts.
Description

Complete Ethical Hacking Series:  Hacking Databases

This course is for beginners and IT pros looking to get certified and land an entry level Cyber Security position paying upwards of six figures!    Each chapter closes with exercises putting your new learned skills into practical use immediately.   You will start by understand network anonymity by using tools such as Tor, Tortilla and Proxy Chains. 

What are the pre-requisites for this course?

  1. Students should have a working understanding of TCP/IP and networking concepts. 

What will you be able to do after taking this course?

  • Build a MySQL and Oracle security testing lab - Build out a database security lab and test your database hacking skills following exercises in the course.


  • Attack databases using 'first-order SQL injection' techniques - SQL Injection (SQLi) refers to an injection attack wherein an attacker can execute malicious SQLstatements (also commonly referred to as a malicious payload) that control a web application's database server (also commonly referred to as a Relational Database Management System – RDBMS).


  • Use the Zed Attack Proxy for data collection on database information - OWASP ZAP (short for Zed Attack Proxy) is an open-source web application security scanner. It is intended to be used by both those new to application security as well as professional penetration testers.
  • Learn how to harden the Database and the underlying OS platform to maximize security - Harden the database listener and configure authentication and authorization parameters for the database and underlying operating system . 


  • Use Shodan to collect information from open databases and IoT devices on the web - Shodan is the world's first search engine for Internet-connected devices.
Who is the target audience?
  • This course is for beginners and IT pros looking to get certified and land an entry level Cyber Security position paying upwards of six figures! There are currently over a million Cyber Security job openings global and demand is greatly outpacing supply which means more opportunity, job security and higher pay for you! Each chapter closes with exercises putting your new learned skills into practical use immediately. You will start by understand and hack databases such as Microsoft SQL, MySQL and Oracle RDBMS.
Students Who Viewed This Course Also Viewed
Curriculum For This Course
12 Lectures
01:56:12
+
Complete Ethical Hacking Series: Hacking Databases
12 Lectures 01:56:12


Database Security - Advanced
05:03

Database Security - Putting it all together
07:50

First Order SQL Injection
01:29

Budget Store - ZAP Data Collection
02:24

Shodan
02:41

MySQL Lab Buildout
08:01

MySQL Security Architecture and Exploits
16:32

MySQL Lockdown
35:48

Operating System Hardening
08:20

Big Data Security
18:02
About the Instructor
Chad Russell
3.6 Average rating
1,050 Reviews
16,805 Students
24 Courses
Join the Cyber Security Industry in 2016!

Instructor Bio – Chad Russell

Join the Cyber Security Industry in 2017!

If you are interested in starting a career in the Cyber Security Industry 2016 is the time! 

Learning the fundamentals of Cyber Security provides you with  a powerful and very useful set of skills.  Study Penetration Testing and Ethical Hacking and learn to think like a hacker so you can better defend your networks and data.   

Jobs in Cyber Security are plentiful, and getting Security+ Certified will give you a strong background to more easily pick up and tackle more advanced exams such as the Certified Ethical Hacker and CISSP certifications.  

Get certified and land an entry level Cyber Security position paying upwards of six figures!  There are currently over a million Cyber Security job openings global and demand is greatly outpacing supply which means more opportunity, job security and higher pay for you!   

But, don't take my word for it...please take a look at the FREE previews (they are available in all my courses) and see for yourself.  This year I have partnered with webofsecurity.com, a premier provider of ‘All Things Information Security’ to bring you a fantastic suite of Cyber Security certification training to help you get into the hottest industry in IT. 

About me:

Hello, I’m Chad Russell.  I’ve been in the CyberSecurity industry for over 15 years.  I’ve taught Microsoft Engineering courses as a Certified trainer, I’ve managed teams of security engineers and analysts for an internet banking provider, I’ve been an information security consultant working for companies including SAP, Microsoft and Oracle.   

I lead and conduct 'Security Risk Assessments' for customers throughout North America with an emphasis on cloud security, identity governance, network security, social engineering, mobile security, breach assessments, database security and access management.  

Over the past 15 years I've held numerous certifications including CISSP, CCNP, MCSE and MCDBA certifications and have a B.S. in Computer Science from Excelsior College  I can help you get certified and get ahead!