-
6.1 Inside Web Apps
-
Notes
6.1.1 Getting Started
-
Video
6.1.2 Inside Web Apps
-
Check for Understanding
6.1.3 Inside Web Apps
-
Free Response
6.1.4 Using View Page Source
-
Connection
6.1.5 Getting Started with OWASP
-
Free Response
6.1.6 Getting Started with OWASP
-
6.2 Developer Tools
-
Video
6.2.1 Developer Tools
-
Check for Understanding
6.2.2 Developer Tools
-
Free Response
6.2.3 Using the Developer Tools
-
Connection
6.2.4 The Top Cybersecurity Blogs and Websites
-
Free Response
6.2.5 Selecting a Site to Follow
-
6.3 Databases
-
Video
6.3.1 Databases
-
Check for Understanding
6.3.2 Databases
-
Connection
6.3.3 Database Administrator Career
-
Free Response
6.3.4 Database Administrator Career
-
Video
6.3.5 Parts of a Database
-
Check for Understanding
6.3.6 Parts of a Database
-
Connection
6.3.7 SQL Database Diagram
-
Free Response
6.3.8 SQL Database Diagram
-
6.4 Clients and Servers
-
Video
6.4.1 Clients and Servers
-
Check for Understanding
6.4.2 Clients and Servers
-
Connection
6.4.3 Inside a Google Data Center
-
Free Response
6.4.4 Inside a Google Data Center
-
Connection
6.4.5 Cloud Vulnerabilities
-
Free Response
6.4.6 Cloud Vulnerabilities Response
-
Video
6.4.7 Client-Server Model
-
Check for Understanding
6.4.8 Client-Server Model
-
Connection
6.4.9 The Future of User Privacy
-
Free Response
6.4.10 The Future of User Privacy
-
6.5 What is SQL?
-
Notes
6.5.1 What is SQL Overview
-
Video
6.5.2 Intro to SQL
-
Check for Understanding
6.5.3 Quiz: What is SQL?
-
6.6 Structuring Data in SQL
-
Video
6.6.1 How to Structure Data in SQL
-
Check for Understanding
6.6.2 How to Structure Data in SQL
-
6.7 Basic Querying in SQL
-
Video
6.7.1 The SELECT Statement
-
Check for Understanding
6.7.2 Basic Querying in SQL
-
Example
6.7.3 Our First SELECT Statement
-
Exercise
6.7.4 Your First SELECT Statement
-
Video
6.7.5 More SELECT Statement
-
Check for Understanding
6.7.6 More SELECT Statement
-
Example
6.7.7 Selecting Specific Columns
-
Exercise
6.7.8 Harry Potter Names
-
6.8 Filtering Queries in SQL
-
Video
6.8.1 The WHERE Clause
-
Check for Understanding
6.8.2 Condition Operators
-
Example
6.8.3 Ravenclaw House
-
Example
6.8.4 People in Gryffindor
-
Example
6.8.5 Filter By ID
-
Exercise
6.8.6 The Weasleys
-
Exercise
6.8.7 The Potters
-
6.9 Common Security Problems
-
Video
6.9.1 Common Security Problems
-
Check for Understanding
6.9.2 Common Security Problems
-
Connection
6.9.3 Meet Security Engineers at Google
-
Free Response
6.9.4 Security Engineering Reflection
-
Video
6.9.5 Living in a Digital World
-
Free Response
6.9.6 Living in a Digital World
-
6.10 SQL Injection Overview
-
Video
6.10.1 SQL Injection Overview
-
Check for Understanding
6.10.2 SQL Injection Overview
-
Connection
6.10.3 Equifax Security Breach
-
Connection
6.10.4 Equifax Exposed Millions
-
Free Response
6.10.5 Equifax SQL Injection Attack
-
6.11 Types of SQLi and Prevention
-
Video
6.11.1 Types of SQLi
-
Check for Understanding
6.11.2 Types of SQLi
-
Video
6.11.3 Preventing SQLi
-
Check for Understanding
6.11.4 Preventing SQLi
-
Connection
6.11.5 Mitigating SQL Injection
-
Free Response
6.11.6 Reflection: Mitigating SQL Injection
-
6.12 Cross-site Scripting
-
Video
6.12.1 Cross-site Scripting
-
Check for Understanding
6.12.2 Cross-site Scripting
-
Connection
6.12.3 XSS Bug in Yahoo Mail
-
Free Response
6.12.4 XSS Bug in Yahoo Mail
-
Notes
6.12.5 XSS Demo Overview
-
Connection
6.12.6 Hacksplaining XSS Demo
-
Connection
6.12.7 Google's Tutorial for XSS
-
Free Response
6.12.8 XSS Reflection
-
6.13 Software Security Quiz
-
Quiz
6.13.1 Software Security Quiz
-
Badge
6.13.2 Software Security Badge