Database Testing Tutorial

Tags: SQL

Step by step Tutorial to learn SQL and Web Security testing with real time examples

Last updated 2022-01-10 | 4.5

- You will gain the ability to design any complex SQL to query a database- (SQL)
- Indepth understanding of GROUP BY
- Subqueries
- aggregate functions
- SQL Server functions
- HAVING clauses -(SQL)
- Understand the difference between the INNER JOIN
- LEFT/RIGHT OUTER JOIN
- and FULL OUTER JOIN- (SQL)

What you'll learn

You will gain the ability to design any complex SQL to query a database- (SQL)
Indepth understanding of GROUP BY
Subqueries
aggregate functions
SQL Server functions
HAVING clauses -(SQL)
Understand the difference between the INNER JOIN
LEFT/RIGHT OUTER JOIN
and FULL OUTER JOIN- (SQL)
You will understand the Importance of Session Hijacking Mechanisim and their confidential data use -(Security Testing)
You can investigate application behavior with Parameter Tampering and Brute force attacks-(Security Testing)
You will get the knowledge of all basics with Http that might cause attacking malicious inputs-(Security Testing)
Create or interact with existing databases and test the Database for schema validations - (SQL)
Detect Request forgery Designs if present any in Web applications --(Security Testing)
You can Clear any Interview on SQL with the Interview questions covered - (SQL)

* Requirements

* ******You need NOT have any proir SQL/Security testing knowledge to start this course*********
* Though these are online Lectures.You will have Life Time instructor support.You can contact me any time for your Queries
* Will respond back with in 12 hours
* All Installation setup including Database basics is taken care as part of course
* Theoretical Material
* Code dump and Interview Guide are available for download

Description

SQL and Security Testing are Additional skills which every software Engineer need to have irrespective of their role in Project. And this course fulfills the gap by teaching both these topics and also  gives you an edge compared to other Engineers at your work .And of course these are one of the common skills which are tested in every Software Engineer Interview.

  • What make this course special for beginners?
    "No more Boring slides or Definitions. I will write every SQL query before you in lecture and teach every topic needed to master in SQL with Practical examples

  • And also This Tutorial will give all the weapons you needed to investigate and unlock the Security Holes in the Web application with powerful Penetration testing approach

  • Course lectures are conceptually driven with root level explanations and bring you to the level where you can write any kind of SQL query and detect any kind of security bugs in the application


This course covers :


MYSQL :

Introduction to SQL -- MySQLOverview -- Start up commands to Setup Database andTables -- Database testing to validate Schema -- Altering Table Schema operations -- Queries to retrieve Data Logical operators on Queries -- Wild cards usage in Queries -- SQL Functions with real time scenarios -- Importance of Group By in SQL -- Advanced SQL Concepts -- SubQueries syntax and usage -- SQL Joins usage and its advantages -- Importance of views in Database -- SQL String functions  -- Dataconstraints with DataBase Testing perspective -- Practise Exercises for Interviews with Solutions -- SQL glossary on discussed topics

Security Testing :

Course Contents: Basics of Security Testing Terminologies involved in Security Domain Top OWASP principles Cross site Scrpiting Xss examples Cookies Importance Danger with stealing of cookies Session Hijacking Cross site forgery Attacks Parameter Tampering Methods to Intercept requests Account Management Password security guidelines Brute force mechanism Importance of Client side validations 

Who this course is for:

  • Any IT professional no matter in what field they are into
  • QA Testers who want to enhance their skill on Data base Testing and Security testing
  • Freshers/Graduates who want to learn computer science foundations

Course content

25 sections • 117 lectures

Why to learn SQL and Security Testing? and how this course is designed Preview 06:55

Please Note Preview 00:13

Introduction to DataBase Preview 09:55

Introduction to SQL and MySQL Preview 06:27

Downloading MySQL server with workbench Preview 07:29

Overview of SQL Editor with basic features Preview 05:26

SQL basic Material for reference Preview 00:01

creating Database and pointing to it Preview 04:47

Creating Tables in database Preview 08:01

Inserting records into Table Preview 07:55

Retrieving records from the Table Preview 06:22

SQL commands glossary on discussed Topics Preview 00:25

Adding and modifying records in a table Preview 06:57

Deleting records and droping database Preview 04:48

Updating rows in a table Preview 07:32

Modifying operations example Preview 05:55

SQL Glossary on discussed topics Preview 00:22

Select Distinct keyword in queris Preview 06:50

SQL WHERE command usage Preview 09:27

Logical operators on Queries AND OR - 1 Preview 07:07

Logical operators 'In' 'Between'- 2 Preview 08:37

Regular expressions Introduction Preview 07:18

Wild cards usage in Qeuries -1 Preview 08:04

SORT by usage in Queries Preview 05:23

SQL glossary on discussed topics Preview 00:37

Importance of Group By in SQL Preview 12:38

Combination of GroupBy and SQL functions(Min,Max,Avg) Preview 07:49

Usage of Having keyword with GroupBy and Aggregate functions Preview 11:24

Difference between Having and Where keyword and when to use them Preview 11:21

Practise Exercises on GroupBy,Having,Where and Aggregate functions keyword -1 Preview 07:53

Practise Exercises on GroupBy,Having,Where and Aggregate functions keyword- 2 Preview 09:31

SQL glossary on discussed topics Preview 00:34

SQL Joins usage and its advantages Preview 05:46

SQL Joins Example Preview 07:30

Relation on subqueries and Joins Preview 09:34

Practical examples on Joins and subqueries Preview 10:25

Left and Right joins importance in SQL Preview 10:33

Practical example on Inner joins, Left join, Right Join Preview 16:15

Importance of views in Database Preview 07:55

views example on Database Preview 07:18

String functions - 1 Preview 09:23

String functions - 2 Preview 08:48

String functions -3 Preview 06:11

SQL glossary on discussed topics Preview 00:36

Importance of Union and Union All SQL Keyword Preview 08:02

Query to intersect records from two tables Preview 10:12

Exists keyword usage in SQL Preview 06:16

CASE Statement in SQL with example Preview 12:39

SQL GLossary Preview 00:15

NOT NUll constraint -1 Preview 06:12

Not Null Constraint Validations and Testing - 2 Preview 08:10

Default Constraint Validations and Testing - 3 Preview 06:28

Unique Constraint Validations and Testing - 4 Preview 05:43

Primary Key Constraint validaton and Testing -5 Preview 09:45

SQL glossary on discussed topics Preview 00:12

Importance of Foreign Key constraint in SQL Preview 10:21

Understand Foreign key rules and constraints with examples Preview 15:28

On DELETE CASCADE Keyword to force rules on Foreign key deletion Preview 10:33

SQL Glossary Preview 00:17

Practise Practise Practise !!! Preview 04:54

Practise Exercise/Interview Questions- 1 Preview 02:43

Practise Exercise/Interview Questions- 2 Preview 02:39

Solutions for Exercise - 1 Preview 00:01

Solutions for Exercise -2 Preview 00:00

Jdbc odbc programming-Creating Project Preview 07:03

Creating Database Tables and connecting to Jdbc java code Preview 16:48

Retrieving data from Database with Java code Preview 06:46

jdbc code download Preview 00:40

What is SQL Injecting Preview 07:32

How to identify SQL loop holes in web application Preview 13:19

Exposing Security loop holes with malcious SQL syntax Preview 09:20

List of urls Pattern which can cause attack with SQL Preview 07:34

Material for reference Preview 00:37

Why security Testing gaining Importance day by day! Preview 09:26

What is Http and Https? Preview 09:58

How can we avoid Man in middle attacks? Preview 06:52

Http Methods overview in talking to servers Preview 09:28

Fiddler Demo- Monitoring Network traffic Preview 03:19

Understanding Fiddler to intercept requests Preview 07:31

Material for Reference Preview 02:10

What is XSS? How it can damage Web sites Preview 09:49

Detecting XSS Vulnerability for Websites - 1 Preview 08:14

Detecting XSS Vulnerability for Websites - 2 Preview 06:14

ByPassing Client Validation to perform XSS Preview 09:08

Encoding all the inputs to avoid Attacks Preview 10:02

Types of Attack - Reflected XSS Preview 08:30

Types of Attack - Persisistence XSS Preview 09:58

How to handle cross site scripting in IE browser Preview 10:22

Material for Reference Preview 01:15

What are cookies and where are they stored Preview 08:48

Session cookie sensitive data Threats Preview 09:43

How can we stop Cookies hijacking Preview 07:41

Methods to Prevent cookie steal -Secure Attribute Preview 13:56

Preventing cookies steal -Http Attribute flag Preview 11:44

Domain and path attribute to restrict cookies Preview 11:53

Setting Timeperiod for Sessions- Security Safety Tip Preview 06:01

Material for Reference Preview 03:39

What is CSRF? How can it cause threat Preview 11:50

Session Hijacking with illegal requests Preview 10:22

Avoid Cross SIte forgeries with Token Mechanisim Preview 08:47

Checklist for Pen Testers to check CSRF Attacks Preview 08:42

Material for Reference Preview 01:28

Different sources to intercept requests Preview 05:35

Importance of having Server side Validations Preview 06:00

Intercepting requests with fiddler tool Preview 06:48

Material for Reference Preview 00:15

Steps to be taken for Password setting Preview 08:46

List of Hacking Passwords and Precautions which need to be taken Preview 05:57

Sources of Attacking Passwords Preview 08:06

Best Practices to be followed in securing Account Preview 09:20

Bruteforce attack handler Mechanism Preview 12:36

Material for Reference Preview 00:26

BONUS LECTURE Preview 01:21