1. Course Introduction
2. Introduction to SQL Injection
3. Anatomy of an SQL Injection Attack
4. Types of SQL Injection Vulnerabilities
5. Introduction to Databases & DBMS
6. Relational vs NoSQL Database
7. Introduction to SQL
8. SQL Fundamentals - Part 1
9. SQL Fundamentals - Part 2
10. Hunting for SQL Injection Vulnerabilities - Part 1
11. Hunting for SQL Injection Vulnerabilities - Part 2
12. Finding SQL Injection Vulnerabilities Manually - Part 1
13. Finding SQL Injection Vulnerabilities Manually - Part 1
14. Finding SQL Injection Vulnerabilities with OWASP ZAP
15. Exploiting Error-Based SQL Injection Vulnerabilities - Part 1
16. Exploiting Error-Based SQL Injection Vulnerabilities - Part 2
17. Exploiting Union-Based SQL Injection Vulnerabilities - Part 1
18. Exploiting Union-Based SQL Injection Vulnerabilities - Part 1
19. Introduction to Boolean-Based SQL Injection Vulnerabilities
20. Exploiting Boolean-Based SQL Injection Vulnerabilities - Part 1
21. Exploiting Boolean-Based SQL Injection Vulnerabilities - Part 2
22. Exploiting Time-Based SQL Injection Vulnerabilities - Part 1
23. Exploiting Time-Based SQL Injection Vulnerabilities - Part 2
24. NoSQL Fundamentals - Part 1
25. NoSQL Fundamentals - Part 2
26. MongoDB NoSQL Injection
27. Course Conclusion