Course Details

Previous Page


Certified Ethical Hacker (CEH): SQL Injection


Overview/Description
Target Audience
Prerequisites
Expected Duration
Lesson Objectives
Course Number



Overview/Description
SQL injection is a type of attack where code to manipulate a back-end database is entered into a web application. This code could be a means to harvest authentication information, escalate privileges, or simply cause a denial-of-service. In this course, we look at SQL injection attacks, the associated tools and techniques used, and mitigation strategies. An ethical hacker is a person who attacks an organization's security on behalf of its owners in order to discover vulnerabilities. Instead of taking advantage of these vulnerabilities, the ethical hacker reports them to the organization who can then put in place the appropriate countermeasures to protect themselves against malicious hackers.This course is the twelfth in a series of courses, which can used in preparation for the Certified Ethical Hacker 312-50 exam. The course has been developed in partnership with EC-Council and is based on their Ethical Hacking and Countermeasures course materials and labs.

Target Audience
Network and information security professionals

Prerequisites
None

Expected Duration (hours)
1.5

Lesson Objectives

Certified Ethical Hacker (CEH): SQL Injection

  • identify correct statements about SQL injection
  • recognize characteristics of methods of testing for SQL injection vulnerabilities
  • identify the characteristics of SQL databases
  • identify the characteristics of SQL injection tools
  • identify the characteristics of SQL injection countermeasure tools
  • identify and counter SQL injection techniques and tools
  • Course Number:
    sp_ceth_a12_it_enus