-
17.1 Inside Web Apps
-
Video
17.1.1 Inside Web Apps
-
Check for Understanding
17.1.2 Inside Web Apps
-
Free Response
17.1.3 Using View Page Source
-
Example
17.1.4 Recreate a Webpage?
-
Connection
17.1.5 Getting Started with OWASP
-
Free Response
17.1.6 Getting Started with OWASP
-
17.2 Developer Tools
-
Video
17.2.1 Developer Tools
-
Check for Understanding
17.2.2 Developer Tools
-
Free Response
17.2.3 Using the Developer Tools
-
Exercise
17.2.4 Console Secrets
-
Example
17.2.5 Local Storage
-
Connection
17.2.6 The Top Cybersecurity Blogs and Websites
-
Free Response
17.2.7 Selecting a Site to Follow
-
17.3 The Value of Data
-
Video
17.3.1 The Value of Data
-
Check for Understanding
17.3.2 The Value of Data Quiz
-
Notes
17.3.3 Exploring Data Visualizations
-
Connection
17.3.4 US Recorded Music Revenue
-
Connection
17.3.5 National Parks
-
Connection
17.3.6 March Madness
-
Connection
17.3.7 Captain Marvel
-
Free Response
17.3.8 Respond: Visualizations
-
Free Response
17.3.9 Free Response: Choosing a Visualization
-
Free Response
17.3.10 Reflection: Design a Survey
-
17.4 Databases
-
Video
17.4.1 Databases
-
Check for Understanding
17.4.2 Databases
-
Connection
17.4.3 Database Administrator Career
-
Free Response
17.4.4 Database Administrator Career
-
Video
17.4.5 Parts of a Database
-
Check for Understanding
17.4.6 Parts of a Database
-
Connection
17.4.7 SQL Database Diagram
-
Free Response
17.4.8 SQL Database Diagram
-
Free Response
17.4.9 Schema Brainstorm
-
17.5 Clients and Servers
-
Video
17.5.1 Clients and Servers
-
Check for Understanding
17.5.2 Clients and Servers
-
Connection
17.5.3 Inside a Google Data Center
-
Free Response
17.5.4 Inside a Google Data Center
-
Connection
17.5.5 Cloud Vulnerabilities
-
Free Response
17.5.6 Cloud Vulnerabilities Response
-
Video
17.5.7 Client-Server Model
-
Check for Understanding
17.5.8 Client-Server Model
-
Connection
17.5.9 The Future of User Privacy
-
Free Response
17.5.10 The Future of User Privacy
-
17.6 What is SQL?
-
Notes
17.6.1 What is SQL Overview
-
Video
17.6.2 Intro to SQL
-
Check for Understanding
17.6.3 Quiz: What is SQL?
-
Video
17.6.4 How to Structure Data in SQL
-
Check for Understanding
17.6.5 How to Structure Data in SQL
-
Example
17.6.6 SQL Tables
-
Free Response
17.6.7 SQL Tables Response
-
17.7 Basic Querying in SQL
-
Video
17.7.1 The SELECT Statement
-
Check for Understanding
17.7.2 Basic Querying in SQL
-
Example
17.7.3 Our First SELECT Statement
-
Exercise
17.7.4 Your First SELECT Statement
-
Video
17.7.5 More SELECT Statement
-
Check for Understanding
17.7.6 More SELECT Statement
-
Example
17.7.7 Selecting Specific Columns
-
Exercise
17.7.8 Harry Potter Names
-
17.8 Filtering Queries in SQL
-
Video
17.8.1 The WHERE Clause
-
Check for Understanding
17.8.2 Condition Operators
-
Example
17.8.3 Ravenclaw House
-
Example
17.8.4 People in Gryffindor
-
Example
17.8.5 Filter By ID
-
Exercise
17.8.6 The Weasleys
-
Exercise
17.8.7 The Potters
-
17.9 Common Security Problems
-
Video
17.9.1 Common Security Problems
-
Check for Understanding
17.9.2 Common Security Problems
-
Connection
17.9.3 Meet Security Engineers at Google
-
Free Response
17.9.4 Security Engineering Reflection
-
Video
17.9.5 Living in a Digital World
-
Free Response
17.9.6 Living in a Digital World
-
17.10 SQL Injection Overview
-
Video
17.10.1 SQL Injection Overview
-
Check for Understanding
17.10.2 SQL Injection Overview
-
Connection
17.10.3 Equifax Security Breach
-
Connection
17.10.4 Equifax Exposed Millions
-
Free Response
17.10.5 Equifax SQL Injection Attack
-
Example
17.10.6 SQLi
-
17.11 Types of SQLi and Prevention
-
Video
17.11.1 Types of SQLi
-
Check for Understanding
17.11.2 Types of SQLi
-
Video
17.11.3 Preventing SQLi
-
Check for Understanding
17.11.4 Preventing SQLi
-
Connection
17.11.5 Mitigating SQL Injection
-
Free Response
17.11.6 Reflection: Mitigating SQL Injection
-
Connection
17.11.7 SQL Injection Practice
-
17.12 Software Security Quiz
-
Unit Quiz
17.12.1 Software Security Quiz