TorBT - Torrents and Magnet Links Search Engine

Learn SQL +Security(pen) testing from Scratch

File Name
Size
!!! More Courses !!!.txt
1.1 kB
1. Course FAQ's/1. Why to learn SQL and Security Testing and how this course is designed-en_US.srt
8.3 kB
1. Course FAQ's/1. Why to learn SQL and Security Testing and how this course is designed.mp4
40 MB
1. Course FAQ's/Please Note.html
303 B
10. Understand SQL String functions and Views with examples/1. Importance of views in Database-en_US.srt
9.2 kB
10. Understand SQL String functions and Views with examples/1. Importance of views in Database.mp4
43 MB
10. Understand SQL String functions and Views with examples/2. views example on Database-en_US.srt
8.0 kB
10. Understand SQL String functions and Views with examples/2. views example on Database.mp4
23 MB
10. Understand SQL String functions and Views with examples/3. String functions - 1-en_US.srt
11 kB
10. Understand SQL String functions and Views with examples/3. String functions - 1.mp4
105 MB
10. Understand SQL String functions and Views with examples/4. String functions - 2-en_US.srt
9.8 kB
10. Understand SQL String functions and Views with examples/4. String functions - 2.mp4
122 MB
10. Understand SQL String functions and Views with examples/5. String functions -3-en_US.srt
7.5 kB
10. Understand SQL String functions and Views with examples/5. String functions -3.mp4
46 MB
10. Understand SQL String functions and Views with examples/SQL glossary on discussed topics.html
856 B
11. Miscelleanous SQL keywords(Union,Intersect,Exist, Case,UnionAll) and their usage/1. Importance of Union and Union All SQL Keyword-en_US.srt
8.8 kB
11. Miscelleanous SQL keywords(Union,Intersect,Exist, Case,UnionAll) and their usage/1. Importance of Union and Union All SQL Keyword.mp4
103 MB
11. Miscelleanous SQL keywords(Union,Intersect,Exist, Case,UnionAll) and their usage/2. Query to intersect records from two tables-en_US.srt
12 kB
11. Miscelleanous SQL keywords(Union,Intersect,Exist, Case,UnionAll) and their usage/2. Query to intersect records from two tables.mp4
128 MB
11. Miscelleanous SQL keywords(Union,Intersect,Exist, Case,UnionAll) and their usage/3. Exists keyword usage in SQL-en_US.srt
6.8 kB
11. Miscelleanous SQL keywords(Union,Intersect,Exist, Case,UnionAll) and their usage/3. Exists keyword usage in SQL.mp4
67 MB
11. Miscelleanous SQL keywords(Union,Intersect,Exist, Case,UnionAll) and their usage/4. CASE Statement in SQL with example-en_US.srt
13 kB
11. Miscelleanous SQL keywords(Union,Intersect,Exist, Case,UnionAll) and their usage/4. CASE Statement in SQL with example.mp4
137 MB
11. Miscelleanous SQL keywords(Union,Intersect,Exist, Case,UnionAll) and their usage/SQL GLossary.html
838 B
12. Importance of Data constraints for Database Validations/1. NOT NUll constraint -1-en_US.srt
6.9 kB
12. Importance of Data constraints for Database Validations/1. NOT NUll constraint -1.mp4
16 MB
12. Importance of Data constraints for Database Validations/2. Not Null Constraint Validations and Testing - 2-en_US.srt
8.6 kB
12. Importance of Data constraints for Database Validations/2. Not Null Constraint Validations and Testing - 2.mp4
50 MB
12. Importance of Data constraints for Database Validations/3. Default Constraint Validations and Testing - 3-en_US.srt
7.8 kB
12. Importance of Data constraints for Database Validations/3. Default Constraint Validations and Testing - 3.mp4
34 MB
12. Importance of Data constraints for Database Validations/4. Unique Constraint Validations and Testing - 4-en_US.srt
6.5 kB
12. Importance of Data constraints for Database Validations/4. Unique Constraint Validations and Testing - 4.mp4
48 MB
12. Importance of Data constraints for Database Validations/5. Primary Key Constraint validaton and Testing -5-en_US.srt
12 kB
12. Importance of Data constraints for Database Validations/5. Primary Key Constraint validaton and Testing -5.mp4
79 MB
12. Importance of Data constraints for Database Validations/SQL glossary on discussed topics.html
388 B
13. Importance of Foreign Key and Primary key with real time examples/1. Importance of Foreign Key constraint in SQL-en_US.srt
13 kB
13. Importance of Foreign Key and Primary key with real time examples/1. Importance of Foreign Key constraint in SQL.mp4
47 MB
13. Importance of Foreign Key and Primary key with real time examples/2. Understand Foreign key rules and constraints with examples-en_US.srt
16 kB
13. Importance of Foreign Key and Primary key with real time examples/2. Understand Foreign key rules and constraints with examples.mp4
243 MB
13. Importance of Foreign Key and Primary key with real time examples/3. On DELETE CASCADE Keyword to force rules on Foreign key deletion-en_US.srt
11 kB
13. Importance of Foreign Key and Primary key with real time examples/3. On DELETE CASCADE Keyword to force rules on Foreign key deletion.mp4
96 MB
13. Importance of Foreign Key and Primary key with real time examples/SQL Glossary.html
1.3 kB
14. Practise Exercises for Interviews with Solutions/1. Practise Practise Practise !!!-en_US.srt
6.2 kB
14. Practise Exercises for Interviews with Solutions/1. Practise Practise Practise !!!.mp4
12 MB
14. Practise Exercises for Interviews with Solutions/Practise ExerciseInterview Questions- 1.html
4.2 kB
14. Practise Exercises for Interviews with Solutions/Practise ExerciseInterview Questions- 2.html
5.2 kB
14. Practise Exercises for Interviews with Solutions/Solutions for Exercise - 1.html
1.8 kB
14. Practise Exercises for Interviews with Solutions/Solutions for Exercise -2.html
1.9 kB
15. JDBC Connectivity for Integration with Selenium (Basic Automation knowledge req/1. Jdbc odbc programming-Creating Project-en_US.srt
7.9 kB
15. JDBC Connectivity for Integration with Selenium (Basic Automation knowledge req/1. Jdbc odbc programming-Creating Project.mp4
33 MB
15. JDBC Connectivity for Integration with Selenium (Basic Automation knowledge req/2. Creating Database Tables and connecting to Jdbc java code-en_US.srt
19 kB
15. JDBC Connectivity for Integration with Selenium (Basic Automation knowledge req/2. Creating Database Tables and connecting to Jdbc java code.mp4
123 MB
15. JDBC Connectivity for Integration with Selenium (Basic Automation knowledge req/3. Retrieving data from Database with Java code-en_US.srt
7.1 kB
15. JDBC Connectivity for Integration with Selenium (Basic Automation knowledge req/3. Retrieving data from Database with Java code.mp4
47 MB
15. JDBC Connectivity for Integration with Selenium (Basic Automation knowledge req/jdbc code download.html
1.4 kB
16. SQL Injection/1. What is SQL Injecting-en_US.srt
8.3 kB
16. SQL Injection/1. What is SQL Injecting.mp4
34 MB
16. SQL Injection/2. How to identify SQL loop holes in web application-en_US.srt
15 kB
16. SQL Injection/2. How to identify SQL loop holes in web application.mp4
106 MB
16. SQL Injection/3. Exposing Security loop holes with malcious SQL syntax-en_US.srt
11 kB
16. SQL Injection/3. Exposing Security loop holes with malcious SQL syntax.mp4
73 MB
16. SQL Injection/4. List of urls Pattern which can cause attack with SQL-en_US.srt
9.8 kB
16. SQL Injection/4. List of urls Pattern which can cause attack with SQL.mp4
21 MB
16. SQL Injection/Material for reference.html
1.1 kB
17. Complete Unix Material/Unix for Beginners- 2.html
45 B
18. Important Note/Important Note.html
316 B
19. Introduction to Security Testing - Phase 2/1. Why security Testing gaining Importance day by day!-en_US.srt
11 kB
19. Introduction to Security Testing - Phase 2/1. Why security Testing gaining Importance day by day!.mp4
176 MB
2. Introduction to SQL/1. Introduction to DataBase-en_US.srt
13 kB
2. Introduction to SQL/1. Introduction to DataBase.mp4
44 MB
2. Introduction to SQL/2. Introduction to SQL and MySQL-en_US.srt
8.3 kB
2. Introduction to SQL/2. Introduction to SQL and MySQL.mp4
27 MB
2. Introduction to SQL/3. Downloading MySQL server with workbench-en_US.srt
10 kB
2. Introduction to SQL/3. Downloading MySQL server with workbench.mp4
101 MB
2. Introduction to SQL/4. Overview of SQL Editor with basic features-en_US.srt
6.9 kB
2. Introduction to SQL/4. Overview of SQL Editor with basic features.mp4
21 MB
2. Introduction to SQL/SQL basic Material for reference.html
42 B
20. Security Testing Basic Terminologies/1. What is Http and Https-en_US.srt
12 kB
20. Security Testing Basic Terminologies/1. What is Http and Https.mp4
46 MB
20. Security Testing Basic Terminologies/2. How can we avoid Man in middle attacks-en_US.srt
8.3 kB
20. Security Testing Basic Terminologies/2. How can we avoid Man in middle attacks.mp4
41 MB
20. Security Testing Basic Terminologies/3. Http Methods overview in talking to servers-en_US.srt
11 kB
20. Security Testing Basic Terminologies/3. Http Methods overview in talking to servers.mp4
60 MB
20. Security Testing Basic Terminologies/4. Fiddler Demo- Monitoring Network traffic-en_US.srt
3.1 kB
20. Security Testing Basic Terminologies/4. Fiddler Demo- Monitoring Network traffic.mp4
15 MB
20. Security Testing Basic Terminologies/5. Understanding Fiddler to intercept requests-en_US.srt
9.2 kB
20. Security Testing Basic Terminologies/5. Understanding Fiddler to intercept requests.mp4
84 MB
20. Security Testing Basic Terminologies/Material for Reference.html
3.4 kB
21. XSS - Cross Site Scripting Vulnerability Testing/1. What is XSS How it can damage Web sites-en_US.srt
11 kB
21. XSS - Cross Site Scripting Vulnerability Testing/1. What is XSS How it can damage Web sites.mp4
44 MB
21. XSS - Cross Site Scripting Vulnerability Testing/2. Detecting XSS Vulnerability for Websites - 1-en_US.srt
8.6 kB
21. XSS - Cross Site Scripting Vulnerability Testing/2. Detecting XSS Vulnerability for Websites - 1.mp4
104 MB
21. XSS - Cross Site Scripting Vulnerability Testing/3. Detecting XSS Vulnerability for Websites - 2-en_US.srt
7.1 kB
21. XSS - Cross Site Scripting Vulnerability Testing/3. Detecting XSS Vulnerability for Websites - 2.mp4
71 MB
21. XSS - Cross Site Scripting Vulnerability Testing/4. ByPassing Client Validation to perform XSS-en_US.srt
11 kB
21. XSS - Cross Site Scripting Vulnerability Testing/4. ByPassing Client Validation to perform XSS.mp4
69 MB
21. XSS - Cross Site Scripting Vulnerability Testing/5. Encoding all the inputs to avoid Attacks-en_US.srt
12 kB
21. XSS - Cross Site Scripting Vulnerability Testing/5. Encoding all the inputs to avoid Attacks.mp4
182 MB
21. XSS - Cross Site Scripting Vulnerability Testing/6. Types of Attack - Reflected XSS-en_US.srt
9.5 kB
21. XSS - Cross Site Scripting Vulnerability Testing/6. Types of Attack - Reflected XSS.mp4
80 MB
21. XSS - Cross Site Scripting Vulnerability Testing/7. Types of Attack - Persisistence XSS-en_US.srt
11 kB
21. XSS - Cross Site Scripting Vulnerability Testing/7. Types of Attack - Persisistence XSS.mp4
150 MB
21. XSS - Cross Site Scripting Vulnerability Testing/8. How to handle cross site scripting in IE browser-en_US.srt
12 kB
21. XSS - Cross Site Scripting Vulnerability Testing/8. How to handle cross site scripting in IE browser.mp4
61 MB
21. XSS - Cross Site Scripting Vulnerability Testing/Material for Reference.html
2.5 kB
22. Importance of Cookies and their role in Security/1. What are cookies and where are they stored-en_US.srt
9.8 kB
22. Importance of Cookies and their role in Security/1. What are cookies and where are they stored.mp4
88 MB
22. Importance of Cookies and their role in Security/2. Session cookie sensitive data Threats-en_US.srt
12 kB
22. Importance of Cookies and their role in Security/2. Session cookie sensitive data Threats.mp4
112 MB
22. Importance of Cookies and their role in Security/3. How can we stop Cookies hijacking-en_US.srt
8.9 kB
22. Importance of Cookies and their role in Security/3. How can we stop Cookies hijacking.mp4
72 MB
22. Importance of Cookies and their role in Security/4. Methods to Prevent cookie steal -Secure Attribute-en_US.srt
16 kB
22. Importance of Cookies and their role in Security/4. Methods to Prevent cookie steal -Secure Attribute.mp4
211 MB
22. Importance of Cookies and their role in Security/5. Preventing cookies steal -Http Attribute flag-en_US.srt
14 kB
22. Importance of Cookies and their role in Security/5. Preventing cookies steal -Http Attribute flag.mp4
140 MB
22. Importance of Cookies and their role in Security/6. Domain and path attribute to restrict cookies-en_US.srt
14 kB
22. Importance of Cookies and their role in Security/6. Domain and path attribute to restrict cookies.mp4
142 MB
22. Importance of Cookies and their role in Security/7. Setting Timeperiod for Sessions- Security Safety Tip-en_US.srt
7.7 kB
22. Importance of Cookies and their role in Security/7. Setting Timeperiod for Sessions- Security Safety Tip.mp4
79 MB
22. Importance of Cookies and their role in Security/Material for Reference.html
5.2 kB
23. Session Hijacking and Cross Site Forgery Attacks/1. What is CSRF How can it cause threat-en_US.srt
15 kB
23. Session Hijacking and Cross Site Forgery Attacks/1. What is CSRF How can it cause threat.mp4
45 MB
23. Session Hijacking and Cross Site Forgery Attacks/2. Session Hijacking with illegal requests-en_US.srt
12 kB
23. Session Hijacking and Cross Site Forgery Attacks/2. Session Hijacking with illegal requests.mp4
58 MB
23. Session Hijacking and Cross Site Forgery Attacks/3. Avoid Cross SIte forgeries with Token Mechanisim-en_US.srt
9.9 kB
23. Session Hijacking and Cross Site Forgery Attacks/3. Avoid Cross SIte forgeries with Token Mechanisim.mp4
83 MB
23. Session Hijacking and Cross Site Forgery Attacks/4. Checklist for Pen Testers to check CSRF Attacks-en_US.srt
11 kB
23. Session Hijacking and Cross Site Forgery Attacks/4. Checklist for Pen Testers to check CSRF Attacks.mp4
48 MB
23. Session Hijacking and Cross Site Forgery Attacks/Material for Reference.html
2.5 kB
24. Parameter Tampering to steal sensitive data/1. Different sources to intercept requests-en_US.srt
6.9 kB
24. Parameter Tampering to steal sensitive data/1. Different sources to intercept requests.mp4
23 MB
24. Parameter Tampering to steal sensitive data/2. Importance of having Server side Validations-en_US.srt
7.3 kB
24. Parameter Tampering to steal sensitive data/2. Importance of having Server side Validations.mp4
16 MB
24. Parameter Tampering to steal sensitive data/3. Intercepting requests with fiddler tool-en_US.srt
7.8 kB
24. Parameter Tampering to steal sensitive data/3. Intercepting requests with fiddler tool.mp4
116 MB
24. Parameter Tampering to steal sensitive data/Material for Reference.html
512 B
25. Account Security/1. Steps to be taken for Password setting-en_US.srt
11 kB
25. Account Security/1. Steps to be taken for Password setting.mp4
37 MB
25. Account Security/2. List of Hacking Passwords and Precautions which need to be taken-en_US.srt
7.1 kB
25. Account Security/2. List of Hacking Passwords and Precautions which need to be taken.mp4
23 MB
25. Account Security/3. Sources of Attacking Passwords-en_US.srt
10 kB
25. Account Security/3. Sources of Attacking Passwords.mp4
64 MB
25. Account Security/4. Best Practices to be followed in securing Account-en_US.srt
13 kB
25. Account Security/4. Best Practices to be followed in securing Account.mp4
39 MB
25. Account Security/5. Bruteforce attack handler Mechanism-en_US.srt
16 kB
25. Account Security/5. Bruteforce attack handler Mechanism.mp4
69 MB
25. Account Security/Bonus Lecture- Discount coupons for other courses.html
11 kB
25. Account Security/Material for Reference.html
1.1 kB
3. CRUD operations on Database with Practical examples/1. creating Database and pointing to it-en_US.srt
5.3 kB
3. CRUD operations on Database with Practical examples/1. creating Database and pointing to it.mp4
8.1 MB
3. CRUD operations on Database with Practical examples/2. Creating Tables in database-en_US.srt
8.7 kB
3. CRUD operations on Database with Practical examples/2. Creating Tables in database.mp4
69 MB
3. CRUD operations on Database with Practical examples/3. Inserting records into Table-en_US.srt
7.8 kB
3. CRUD operations on Database with Practical examples/3. Inserting records into Table.mp4
94 MB
3. CRUD operations on Database with Practical examples/4. Retrieving records from the Table-en_US.srt
6.6 kB
3. CRUD operations on Database with Practical examples/4. Retrieving records from the Table.mp4
33 MB
3. CRUD operations on Database with Practical examples/SQL commands glossary on discussed Topics.html
768 B
4. Altering Table Schema operations/1. Adding and modifying records in a table-en_US.srt
7.1 kB
4. Altering Table Schema operations/1. Adding and modifying records in a table.mp4
51 MB
4. Altering Table Schema operations/2. Deleting records and droping database-en_US.srt
5.7 kB
4. Altering Table Schema operations/2. Deleting records and droping database.mp4
14 MB
4. Altering Table Schema operations/3. Updating rows in a table-en_US.srt
7.9 kB
4. Altering Table Schema operations/3. Updating rows in a table.mp4
102 MB
4. Altering Table Schema operations/4. Modifying operations example-en_US.srt
6.6 kB
4. Altering Table Schema operations/4. Modifying operations example.mp4
93 MB
4. Altering Table Schema operations/SQL Glossary on discussed topics.html
691 B
5. SQL Logical operators to retrieve Data/1. Select Distinct keyword in queris-en_US.srt
7.2 kB
5. SQL Logical operators to retrieve Data/1. Select Distinct keyword in queris.mp4
82 MB
5. SQL Logical operators to retrieve Data/2. SQL WHERE command usage-en_US.srt
9.5 kB
5. SQL Logical operators to retrieve Data/2. SQL WHERE command usage.mp4
117 MB
5. SQL Logical operators to retrieve Data/3. Logical operators on Queries AND OR - 1-en_US.srt
6.8 kB
5. SQL Logical operators to retrieve Data/3. Logical operators on Queries AND OR - 1.mp4
123 MB
5. SQL Logical operators to retrieve Data/4. Logical operators 'In' 'Between'- 2-en_US.srt
9.3 kB
5. SQL Logical operators to retrieve Data/4. Logical operators 'In' 'Between'- 2.mp4
116 MB
6. Regular expressions in writing Smart SQL Queries/1. Regular expressions Introduction-en_US.srt
8.1 kB
6. Regular expressions in writing Smart SQL Queries/1. Regular expressions Introduction.mp4
94 MB
6. Regular expressions in writing Smart SQL Queries/2. Wild cards usage in Qeuries -1-en_US.srt
8.9 kB
6. Regular expressions in writing Smart SQL Queries/2. Wild cards usage in Qeuries -1.mp4
38 MB
6. Regular expressions in writing Smart SQL Queries/3. SORT by usage in Queries-en_US.srt
6.2 kB
6. Regular expressions in writing Smart SQL Queries/3. SORT by usage in Queries.mp4
29 MB
6. Regular expressions in writing Smart SQL Queries/SQL glossary on discussed topics.html
1.0 kB
7. Deeper Understanding on GroupBy, Aggregate functions with practical examples/1. Importance of Group By in SQL-en_US.srt
14 kB
7. Deeper Understanding on GroupBy, Aggregate functions with practical examples/1. Importance of Group By in SQL.mp4
205 MB
7. Deeper Understanding on GroupBy, Aggregate functions with practical examples/2. Combination of GroupBy and SQL functions(Min,Max,Avg)-en_US.srt
8.3 kB
7. Deeper Understanding on GroupBy, Aggregate functions with practical examples/2. Combination of GroupBy and SQL functions(Min,Max,Avg).mp4
102 MB
7. Deeper Understanding on GroupBy, Aggregate functions with practical examples/3. Usage of Having keyword with GroupBy and Aggregate functions-en_US.srt
12 kB
7. Deeper Understanding on GroupBy, Aggregate functions with practical examples/3. Usage of Having keyword with GroupBy and Aggregate functions.mp4
178 MB
7. Deeper Understanding on GroupBy, Aggregate functions with practical examples/4. Difference between Having and Where keyword and when to use them-en_US.srt
12 kB
7. Deeper Understanding on GroupBy, Aggregate functions with practical examples/4. Difference between Having and Where keyword and when to use them.mp4
195 MB
7. Deeper Understanding on GroupBy, Aggregate functions with practical examples/5. Practise Exercises on GroupBy,Having,Where and Aggregate functions keyword -1-en_US.srt
8.6 kB
7. Deeper Understanding on GroupBy, Aggregate functions with practical examples/5. Practise Exercises on GroupBy,Having,Where and Aggregate functions keyword -1.mp4
128 MB
7. Deeper Understanding on GroupBy, Aggregate functions with practical examples/6. Practise Exercises on GroupBy,Having,Where and Aggregate functions keyword- 2-en_US.srt
9.5 kB
7. Deeper Understanding on GroupBy, Aggregate functions with practical examples/6. Practise Exercises on GroupBy,Having,Where and Aggregate functions keyword- 2.mp4
151 MB
7. Deeper Understanding on GroupBy, Aggregate functions with practical examples/SQL glossary on discussed topics.html
1.4 kB
7. Deeper Understanding on GroupBy, Aggregate functions with practical examples/groupby.csv
1.4 kB
8. Building SQL Sub queries with examples/1. SubQueries syntax and usage-en_US.srt
8.8 kB
8. Building SQL Sub queries with examples/1. SubQueries syntax and usage.mp4
24 MB
8. Building SQL Sub queries with examples/2. SubQueries Example-en_US.srt
6.3 kB
8. Building SQL Sub queries with examples/2. SubQueries Example.mp4
42 MB
9. SQL Joins, Inner Joins, Outer joins, Left&Right joins with Interview questions/1. SQL Joins usage and its advantages-en_US.srt
6.1 kB
9. SQL Joins, Inner Joins, Outer joins, Left&Right joins with Interview questions/1. SQL Joins usage and its advantages.mp4
28 MB
9. SQL Joins, Inner Joins, Outer joins, Left&Right joins with Interview questions/2. SQL Joins Example-en_US.srt
8.1 kB
9. SQL Joins, Inner Joins, Outer joins, Left&Right joins with Interview questions/2. SQL Joins Example.mp4
78 MB
9. SQL Joins, Inner Joins, Outer joins, Left&Right joins with Interview questions/3. Relation on subqueries and Joins-en_US.srt
11 kB
9. SQL Joins, Inner Joins, Outer joins, Left&Right joins with Interview questions/3. Relation on subqueries and Joins.mp4
127 MB
9. SQL Joins, Inner Joins, Outer joins, Left&Right joins with Interview questions/4. Practical examples on Joins and subqueries-en_US.srt
12 kB
9. SQL Joins, Inner Joins, Outer joins, Left&Right joins with Interview questions/4. Practical examples on Joins and subqueries.mp4
148 MB
9. SQL Joins, Inner Joins, Outer joins, Left&Right joins with Interview questions/5. Left and Right joins importance in SQL-en_US.srt
12 kB
9. SQL Joins, Inner Joins, Outer joins, Left&Right joins with Interview questions/5. Left and Right joins importance in SQL.mp4
124 MB
9. SQL Joins, Inner Joins, Outer joins, Left&Right joins with Interview questions/6. Practical example on Inner joins, Left join, Right Join-en_US.srt
18 kB
9. SQL Joins, Inner Joins, Outer joins, Left&Right joins with Interview questions/6. Practical example on Inner joins, Left join, Right Join.mp4
240 MB
logo.jpg
72 kB