• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Degrees
​
Log In
Join for Free
  • Browse
  • Sql Injection Techniques

Results for "sql injection techniques"


  • Status: Free Trial
    Free Trial
    B

    Board Infinity

    Mastering SQL and Data Management with Teradata

    Skills you'll gain: SQL, Transaction Processing, Query Languages, Database Management, Data Manipulation, Data Security, Stored Procedure, Relational Databases, Data Transformation, Data Storage, Data Integrity, Authorization (Computing), Data Dictionary

    Intermediate · Course · 1 - 4 Weeks

  • C

    Coursera

    SQL Window Functions for Analytics

    Skills you'll gain: SQL, PostgreSQL, Query Languages, Database Management, Database Systems, Data Manipulation

    4.7
    Rating, 4.7 out of 5 stars
    ·
    41 reviews

    Advanced · Guided Project · Less Than 2 Hours

  • Status: Free Trial
    Free Trial
    A

    Amazon

    Database Management with Java and SQL

    Skills you'll gain: SQL, Database Management, MySQL, Relational Databases, Query Languages, Databases, Database Application, Database Design, Data Access, Java, Java Programming, UI Components, User Interface (UI), Software Development

    4.3
    Rating, 4.3 out of 5 stars
    ·
    35 reviews

    Beginner · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    C

    Coursera

    Introduction to Prompt Injection Vulnerabilities

    Skills you'll gain: AI Security, Large Language Modeling, Cybersecurity, Prompt Engineering, Cyber Security Strategy, Threat Modeling, Cyber Security Assessment, Risk Analysis, Application Security, Vulnerability Assessments, Network Security

    3.6
    Rating, 3.6 out of 5 stars
    ·
    19 reviews

    Beginner · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    P

    Packt

    Advanced Exploitation and Scripting Techniques

    Skills you'll gain: Exploitation techniques, Scripting, Brute-force attacks, Python Programming, Command-Line Interface, Program Development, Network Protocols, TCP/IP, Data Persistence, Debugging

    4.8
    Rating, 4.8 out of 5 stars
    ·
    12 reviews

    Advanced · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    J

    Johns Hopkins University

    Introduction to Penetration Testing and Ethical Hacking

    Skills you'll gain: Penetration Testing, MITRE ATT&CK Framework, Cyber Security Assessment, Public Key Infrastructure, Cybersecurity, Threat Modeling, Cryptography, Exploitation techniques, Security Testing, Vulnerability Scanning, Encryption, Technical Writing, Human Factors (Security)

    3.8
    Rating, 3.8 out of 5 stars
    ·
    8 reviews

    Intermediate · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    U

    University of Colorado Boulder

    Security & Ethical Hacking: Attacking the Network

    Skills you'll gain: Penetration Testing, Network Security, Network Monitoring, Exploitation techniques, Virtual Private Networks (VPN), Cryptographic Protocols, Network Protocols, General Networking, Computer Networking, Command-Line Interface, Network Analysis, Proxy Servers

    Build toward a degree

    4.7
    Rating, 4.7 out of 5 stars
    ·
    9 reviews

    Intermediate · Course · 1 - 3 Months

  • P

    Packt

    Microsoft SQL Server Development for Everyone

    Skills you'll gain: Microsoft SQL Servers, SQL, Database Design, Stored Procedure, Relational Databases, Database Systems, Database Architecture and Administration, Query Languages, Data Manipulation, Microsoft Development Tools, Scripting, Authentications, User Accounts

    4.9
    Rating, 4.9 out of 5 stars
    ·
    7 reviews

    Beginner · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    U

    University of California, Davis

    Exploiting and Securing Vulnerabilities in Java Applications

    Skills you'll gain: Open Web Application Security Project (OWASP), Authentications, Exploit development, Penetration Testing, Application Security, Vulnerability Assessments, Code Review, Vulnerability Management, Secure Coding, Authorization (Computing), Java, Java Programming, Dependency Analysis, Docker (Software), JSON, Git (Version Control System)

    4.4
    Rating, 4.4 out of 5 stars
    ·
    66 reviews

    Intermediate · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    I

    Infosec

    Execution, persistence, privilege escalation and evasion

    Skills you'll gain: Cybersecurity, Cyber Operations, Data Persistence, Exploitation techniques, Persistence, Intrusion Detection and Prevention, Scripting, Python Programming, Microsoft Windows

    4.5
    Rating, 4.5 out of 5 stars
    ·
    95 reviews

    Intermediate · Course · 1 - 4 Weeks

  • C

    Coursera

    Understanding Basic SQL Syntax

    Skills you'll gain: SQL, Query Languages, Data Access, Relational Databases, Data Manipulation

    4.7
    Rating, 4.7 out of 5 stars
    ·
    333 reviews

    Beginner · Guided Project · Less Than 2 Hours

  • Status: New
    New
    Status: Free Trial
    Free Trial
    P

    Pearson

    Certified Ethical Hacker (CEH): Unit 5

    Skills you'll gain: Open Web Application Security Project (OWASP), Authentications, Web Applications, Penetration Testing, Application Security, Security Controls, Vulnerability Assessments, Application Programming Interface (API), Exploitation techniques, Web Servers, Cloud Security, SQL

    Intermediate · Course · 1 - 4 Weeks

1…567…445

In summary, here are 10 of our most popular sql injection techniques courses

  • Mastering SQL and Data Management with Teradata: Board Infinity
  • SQL Window Functions for Analytics: Coursera
  • Database Management with Java and SQL: Amazon
  • Introduction to Prompt Injection Vulnerabilities: Coursera
  • Advanced Exploitation and Scripting Techniques: Packt
  • Introduction to Penetration Testing and Ethical Hacking: Johns Hopkins University
  • Security & Ethical Hacking: Attacking the Network: University of Colorado Boulder
  • Microsoft SQL Server Development for Everyone: Packt
  • Exploiting and Securing Vulnerabilities in Java Applications: University of California, Davis
  • Execution, persistence, privilege escalation and evasion: Infosec

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • English Speaking
  • Generative AI (GenAI)
  • Microsoft Excel
  • Microsoft Power BI
  • Project Management
  • Python

Certificates & Programs

  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM Data Analyst Certificate
  • IBM Data Science Certificate
  • Machine Learning Certificate
  • Microsoft Power BI Data Analyst Certificate
  • UI / UX Design Certificate

Industries & Careers

  • Business
  • Computer Science
  • Data Science
  • Education & Teaching
  • Engineering
  • Finance
  • Healthcare
  • Human Resources (HR)
  • Information Technology (IT)
  • Marketing

Career Resources

  • Career Aptitude Test
  • Examples of Strengths and Weaknesses for Job Interviews
  • High-Income Skills to Learn
  • How Does Cryptocurrency Work?
  • How to Highlight Duplicates in Google Sheets
  • How to Learn Artificial Intelligence
  • Popular Cybersecurity Certifications
  • Preparing for the PMP Certification
  • Signs You Will Get the Job After an Interview
  • What Is Artificial Intelligence?

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Share your Coursera learning story

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Do Not Sell/Share
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2026 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok