Skip to content

This repository contains notes, practical labs, research, and certificate from the SQL Injection Attacks – Continue Learning (EC-Council) program. It explores SQLi techniques (classic, error-based, blind, time-based, advanced) along with real-world case studies, timelines, and blue-team defense strategies for secure coding and mitigation.

License

Notifications You must be signed in to change notification settings

ngvuthdanhh/certificate-sqlinjection-eccouncil-continue-learning

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

35 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

🛡️ SQL Injection Attacks – Continue Learning (EC-Council)

Course Status Type Focus Maintainer

This repository contains notes, practical exercises, case studies, references, and certificate of completion for the SQL Injection Attacks – Continue Learning (EC-Council) program. The course provides an in-depth look at SQL Injection techniques, exploitation paths, and mitigation strategies.


📚 Notes


🧪 Practical


🔬 Research


📖 Docs


📸 Screenshots

Step Screenshot
🏫 Course Overview
📚 What You Will Learn
⭐ Personal Review

📜 Certificate

🎓 SQL Injection Attacks – Continue Learning (EC-Council)


📝 Personal Review

This course deepened my understanding of SQL Injection vulnerabilities and their impact on web applications.
The labs helped me distinguish between classic, blind, error-based, and time-based SQLi techniques, while the defensive modules reinforced best practices in secure coding and blue-team detection.
It provides a strong foundation for learners who want to strengthen web application security knowledge.


✍️ Author

Thành Danh – Red Team Learner & Security Researcher


📄 License

This project is licensed under the terms of the MIT License. See LICENSE for full details.
© 2025 ngvuthdanhh. All rights reserved.

About

This repository contains notes, practical labs, research, and certificate from the SQL Injection Attacks – Continue Learning (EC-Council) program. It explores SQLi techniques (classic, error-based, blind, time-based, advanced) along with real-world case studies, timelines, and blue-team defense strategies for secure coding and mitigation.

Topics

Resources

License

Code of conduct

Stars

Watchers

Forks