Enroll Now | Limited Free Coupons


Become a SmartyBro Contributors - 24/7 Live Forums | Submit Your Udemy, Skillshare and Eduonix Free Courses

Ethical hacking: Perform hands-on injection attacks and learn how to prevent NoSQL, LDAP, LOG, CSV and SQL injection

100% Off & "FREE" Udemy Coupons 2022 | December Christmas offer,Best Udemy Free Courses 2022,Tech and Progrmming

Secure coding: Dive into Injections with Java & Spring boot



What you’ll learn

Comfy coding
Injection vulnerability
Square Injection with PostgreSQL
NoSQL Injection with MongoDB
LDAP Injection with OpenLDAP
LOG Injection
CSV Injection
Spring protection shape login authentication
Spring facts JPA
Spring records MongoDB
Spring LDAP
Spring Validation
Understanding of Java
Basic information of Spring Framework
Primary expertise of square
Basic expertise of web utility development


Good day! My call is Ali Gelenler. I am right here to help you to learn securing your code and making it loose from injection attacks.

On this course, we can recognition on distinctive kind of injection attacks;

Sq. Injection

NoSQL injection

LDAP injection

LOG injection

CSV injection

We are able to observe a fingers-on method. You will now not simplest learn how to take advantage of an software the use of one-of-a-kind type of injection attacks, but additionally increase the inclined applications from scratch wherein we’ll have a common internet login module with spring security shape login, and separate programs for sq., NoSQL and LDAP injections. The packages will be developed using Java and Spring boot together with the most current technology and tools, like PostgreSQL for square Injection, MongoDB for NoSQL injection and OpenLDAP for LDAP injection.

In each phase there can be;

Improvement of the prone software using Java, Spring boot and Spring protection

Hacking of the utility with diverse assaults

Protection steps and the implementations to prevent injection assaults

On the quit of the path you may understand the extraordinary kind of injection vulnerabilities, in addition to perform injection attacks in opposition to the vulnerable programs you’ve got advanced, and learn how to shield your programs towards the injection attacks the use of numerous strategies including validation and sanitisation using white listing method, parametrised queries with organized statements, escaping output, the usage of cozy depended on libraries, mistakes dealing with and logging, and standard coding practices.

In case you want to pass the development and handiest see the hacking of applications, you can leap into the injection lectures and download the supply code provided in the sources section of that lecture. Be conscious that you may nevertheless need to install Postgresql for sq. Injection, MongoDB for NoSQL injection and OpenLDAP docker container for LDAP injection. You could see a way to install and configure these facts resources inside the starting lectures of every injection section.

Who this direction is for:
One that desires to examine relaxed coding and net protection
One which wants to dive into injection vulnerability with special sort of assaults
One which loves to learn with a palms-on approach

Ethical hacking: Perform hands-on injection attacks and learn how to prevent NoSQL, LDAP, LOG, CSV and SQL injection

coding: Dive into Injections with Java & Spring boot


, , , , ,

Notify of
Inline Feedbacks
View all comments