Ethical Hacker: SQL Injection
Explore SQL Injection attacks and how they can be used to inject retrieve or bypass authentication mechanisms. This course will help prepare for the 312-50: Certified Ethical Hacker v10 exam. Watch this video and learn how to identify SQL Injection risks and explain how to avoid SQL Injection. Gain a high-level view of how Transact-SQL statements work and finally you will learn how to review SQL injection exercise examples.