• For Individuals
  • For Businesses
  • For Universities
  • For Governments
Degrees
​
Log In
Join for Free
  • Browse
  • Database Injection Vulnerabilities

Results for "database injection vulnerabilities"


  • Status: New
    New
    Status: Free Trial
    Free Trial
    C

    Coursera

    Secure AI: API and Dependency Risks

    Skills you'll gain: AI Security, Open Web Application Security Project (OWASP), Vulnerability Assessments, Computer Security Incident Management, Vulnerability Management, Vulnerability Scanning, Application Security, Security Controls, Secure Coding, Security Testing, API Testing, Authentications, Threat Management, Hardening, Dependency Analysis, Package and Software Management, Application Programming Interface (API), Risk Analysis, Data Validation, Supply Chain

    Intermediate · Course · 1 - 4 Weeks

  • P

    Packt

    Offensive Hacking Unfolded - Become a Pro Pentester

    Skills you'll gain: Exploitation techniques, Metasploit, Vulnerability Assessments, Vulnerability Scanning, Brute-force attacks, Virtual Environment, Cybersecurity, Technical Writing, Web Servers, Linux

    4
    Rating, 4 out of 5 stars
    ·
    7 reviews

    Beginner · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    I

    IBM

    Exploitation and Penetration Testing with Metasploit

    Skills you'll gain: Penetration Testing, Exploit development, Network Security, Vulnerability, Cybersecurity, Vulnerability Assessments, Human Factors (Security), Information Systems Security, Data Persistence

    4.3
    Rating, 4.3 out of 5 stars
    ·
    32 reviews

    Intermediate · Course · 1 - 3 Months

  • Status: New
    New
    Status: Free Trial
    Free Trial
    E

    Edureka

    Vulnerability Assessment and Management

    Skills you'll gain: Vulnerability Assessments, Vulnerability Management, Vulnerability Scanning, Cyber Security Assessment, Hardening, Threat Management, Security Testing, Patch Management, Cyber Risk, Threat Detection, Cyber Threat Hunting, Application Security, Cyber Attacks, Cyber Engineering, Cyber Security Policies, Dashboard Creation, Cyber Security Strategy, Cyber Governance, Network Engineering, Web Applications

    Intermediate · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    E

    EDUCBA

    Ethical Hacking with Metasploit, SQL & Crypto

    Skills you'll gain: Exploit development, Metasploit, Exploitation techniques, Penetration Testing, Database Management, Cryptography, Security Testing, Data Import/Export, Encryption, Brute-force attacks, Vulnerability Assessments, Cybersecurity, SQL, Command-Line Interface

    4.8
    Rating, 4.8 out of 5 stars
    ·
    20 reviews

    Mixed · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    U

    University of Colorado System

    Hacking and Patching

    Skills you'll gain: Penetration Testing, Exploit development, Metasploit, Application Security, Security Testing, Cyber Security Assessment, Vulnerability Scanning, Brute-force attacks, Secure Coding, Exploitation techniques, Software Design Patterns, Vulnerability Assessments, Memory Management, Amazon Web Services, SQL, Amazon Elastic Compute Cloud, Operating Systems, Data Validation

    4
    Rating, 4 out of 5 stars
    ·
    279 reviews

    Intermediate · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    G

    Google

    Assets, Threats, and Vulnerabilities

    Skills you'll gain: Threat Modeling, Threat Management, Vulnerability Management, Cyber Threat Intelligence, Security Awareness, Cybersecurity, Vulnerability Assessments, Threat Detection, MITRE ATT&CK Framework, Data Security, Cyber Security Strategy, Cyber Risk, Authorization (Computing), Malware Protection, Authentications, Security Controls, Risk Management Framework, Identity and Access Management, Data Management, Cryptography

    4.8
    Rating, 4.8 out of 5 stars
    ·
    4.1K reviews

    Beginner · Course · 1 - 4 Weeks

  • Status: Free Trial
    Free Trial
    I

    Illinois Tech

    Relational Database Implementation and Applications

    Skills you'll gain: Relational Databases, Database Application, Database Management, Database Development, SQL, Databases, Database Systems, MySQL, Database Management Systems, Database Software, Database Design, Transaction Processing, Stored Procedure, Data Access, Application Development, Java, Data Integrity, Performance Tuning

    Build toward a degree

    4.6
    Rating, 4.6 out of 5 stars
    ·
    48 reviews

    Intermediate · Course · 1 - 3 Months

  • Status: Free Trial
    Free Trial
    P

    Pearson

    Certified Ethical Hacker (CEH): Unit 5

    Skills you'll gain: Open Web Application Security Project (OWASP), Authentications, Web Applications, Penetration Testing, Application Security, Security Controls, Security Testing, Vulnerability Assessments, Application Programming Interface (API), Exploitation techniques, Web Servers, Cloud Security

    Intermediate · Course · 1 - 4 Weeks

  • Status: New
    New
    Status: Free Trial
    Free Trial
    E

    Edureka

    Penetration Testing and Vulnerability Scanning

    Skills you'll gain: Penetration Testing, Vulnerability Scanning, Vulnerability Management, Vulnerability Assessments, Cyber Security Assessment, Open Web Application Security Project (OWASP), Security Testing, Exploitation techniques, Application Security, Patch Management, Cyber Threat Intelligence, Cyber Engineering, Cyber Governance, Risk Management Framework, Linux Administration, Dashboard Creation, Ethical Standards And Conduct, Linux, Linux Commands, Linux Servers

    Beginner · Course · 1 - 4 Weeks

  • P

    Packt

    Web Hacking Expert - Full-Stack Exploitation Mastery

    Skills you'll gain: Exploitation techniques, Penetration Testing, Secure Coding, Web Applications, Full-Stack Web Development, Vulnerability Assessments, Application Security, Angular, Ajax, Javascript

    Intermediate · Course · 1 - 3 Months

  • Status: Free
    Free
    C

    Clemson University

    Database Management Systems

    Skills you'll gain: Database Systems, Database Management, Database Design, Database Management Systems, MySQL, Database Theory, Relational Databases, Database Software, Data Modeling, Database Development, Database Architecture and Administration, SQL, NoSQL, Diagram Design, Dependency Analysis

    Build toward a degree

    4.4
    Rating, 4.4 out of 5 stars
    ·
    71 reviews

    Intermediate · Course · 1 - 3 Months

1…456…186

In summary, here are 10 of our most popular database injection vulnerabilities courses

  • Secure AI: API and Dependency Risks: Coursera
  • Offensive Hacking Unfolded - Become a Pro Pentester: Packt
  • Exploitation and Penetration Testing with Metasploit: IBM
  • Vulnerability Assessment and Management: Edureka
  • Ethical Hacking with Metasploit, SQL & Crypto: EDUCBA
  • Hacking and Patching: University of Colorado System
  • Assets, Threats, and Vulnerabilities: Google
  • Relational Database Implementation and Applications: Illinois Tech
  • Certified Ethical Hacker (CEH): Unit 5: Pearson
  • Penetration Testing and Vulnerability Scanning: Edureka

Other topics to explore

Arts and Humanities
338 courses
Business
1095 courses
Computer Science
668 courses
Data Science
425 courses
Information Technology
145 courses
Health
471 courses
Math and Logic
70 courses
Personal Development
137 courses
Physical Science and Engineering
413 courses
Social Sciences
401 courses
Language Learning
150 courses

Coursera Footer

Skills

  • Accounting
  • Artificial Intelligence (AI)
  • Cybersecurity
  • Data Analytics
  • Digital Marketing
  • Human Resources (HR)
  • Microsoft Excel
  • Project Management
  • Python
  • SQL

Professional Certificates

  • Google AI Certificate
  • Google Cybersecurity Certificate
  • Google Data Analytics Certificate
  • Google IT Support Certificate
  • Google Project Management Certificate
  • Google UX Design Certificate
  • IBM AI Engineering Certificate
  • IBM AI Product Manager Certificate
  • IBM Data Science Certificate
  • Intuit Academy Bookkeeping Certificate

Courses & Specializations

  • AI Essentials Specialization
  • AI For Business Specialization
  • AI For Everyone Course
  • AI in Healthcare Specialization
  • Deep Learning Specialization
  • Excel Skills for Business Specialization
  • Financial Markets Course
  • Machine Learning Specialization
  • Prompt Engineering for ChatGPT Course
  • Python for Everybody Specialization

Career Resources

  • Career Aptitude Test
  • CAPM Certification Requirements
  • CompTIA A+ Certification Requirements
  • CompTIA Security+ Certification Requirements
  • Essential IT Certifications
  • Free IT Certifications and Courses
  • High-Income Skills to Learn
  • How to Learn Artificial Intelligence
  • PMP Certification Requirements
  • Popular Cybersecurity Certifications

Coursera

  • About
  • What We Offer
  • Leadership
  • Careers
  • Catalog
  • Coursera Plus
  • Professional Certificates
  • MasterTrack® Certificates
  • Degrees
  • For Enterprise
  • For Government
  • For Campus
  • Become a Partner
  • Social Impact
  • Free Courses
  • Share your Coursera learning story

Community

  • Learners
  • Partners
  • Beta Testers
  • Blog
  • The Coursera Podcast
  • Tech Blog

More

  • Press
  • Investors
  • Terms
  • Privacy
  • Help
  • Accessibility
  • Contact
  • Articles
  • Directory
  • Affiliates
  • Modern Slavery Statement
  • Do Not Sell/Share
Learn Anywhere
Download on the App Store
Get it on Google Play
Logo of Certified B Corporation
© 2026 Coursera Inc. All rights reserved.
  • Coursera Facebook
  • Coursera Linkedin
  • Coursera Twitter
  • Coursera YouTube
  • Coursera Instagram
  • Coursera TikTok