Overview

What are injection flaws? Injection flaws, such as SQL, JSON, and Command injection, occur when untrusted data is sent to an interpreter as part of a command or query

Course Content

Course Description

What are injection flaws? Injection flaws, such as SQL, JSON, and Command injection, occur when untrusted data is sent to an interpreter as part of a command or query. Why do I need this certification? This is a very common vulnerability type, and could lead to the full takeover of a system if neglected. What will I learn? SQL, JSON, and Command injection Mitigations, countermeasures and defenses for each Get your Injection Flaws Certification Today: Injection flaws, such as SQL, JSON, and Command injection, occur when untrusted data is sent to an interpreter as part of a command or query. It is often found in database queries, but other examples are OS commands, XML parsers or when user input is sent as program arguments. This is a very common vulnerability type, especially in legacy code, when fewer were aware of the danger. Because it is a broad category of a vulnerability, the danger varies from case to case. The worst-case scenario would be a full takeover of the system, which is possible depending on where the injection is and in what environment. Unlike the SQL Injection Micro Certification, the Injections Micro Certification is broader, and provides an overview of SQL, JSON, and Command injection. You will learn mitigations, countermeasures and defenses for each.

Certificate Of Completion

Complete this course and earn a Injection Flaws Certificate of Completion