Certified Ethical Hacker – CEHv10: SQL Injection
Explore SQL Injection attacks and how they can be used to inject, retrieve, or bypass authentication mechanisms. This course will help prepare for the 312-50: Certified Ethical Hacker v10 exam. Watch this video and learn how to identify SQL Injection risks and explain how to avoid SQL Injection. Gain a high-level view of how Transact-SQL statements work, and finally, you will learn how to review SQL injection exercise examples.