Free Course Image SQL Injection Masterclass - Web Security Academy Labs

Free online courseSQL Injection Masterclass - Web Security Academy Labs

Duration of the online course: 9 hours and 42 minutes

New

Free SQL injection masterclass with hands-on web security labs, covering UNION, blind SQLi, filter bypass, error-based and OAST techniques.

In this free course, learn about

  • SQL Injection Foundations and Core Labs
  • UNION-Based SQL Injection Essentials
  • Database Fingerprinting and Enumeration with SQLi
  • Blind SQL Injection Techniques
  • Out-of-Band SQL Injection and Advanced Filter Bypasses

Course Description

Explore practical SQL injection skills with this free online masterclass focused on real-world web application security scenarios. Designed for learners in Cyber Security, it guides you through identifying, exploiting, and understanding SQLi weaknesses using hands-on Web Security Academy style labs.

You will progress from foundational concepts to increasingly advanced attack techniques, including data extraction from vulnerable queries, authentication bypass, UNION-based exploitation, and methods for discovering columns and pulling information from other tables. You will also learn how to enumerate database details such as type and version across common platforms, and how to list database contents in different environments.

The course dives deep into blind SQL injection approaches, covering conditional responses, error-based inference, time-delay techniques, and information retrieval when results are not directly visible. It also introduces advanced scenarios such as out-of-band interaction and data exfiltration, filter bypass strategies like XML encoding, and visible error-based SQLi workflows. If you want a lab-driven path to stronger web pentesting capability, this course provides a structured way to build confidence with SQL injection from start to advanced practice.

Course content

  • Video class: SQL Injection | Complete Guide 1h11m
  • Exercise: Which defense is considered the correct primary way to prevent SQL injection?
  • Video class: SQL Injection - Lab #1 SQL injection vulnerability in WHERE clause allowing retrieval of hidden data 29m
  • Exercise: In a SQL injection lab, what payload is used to make the WHERE clause always true and reveal both released and unreleased products?
  • Video class: SQL Injection - Lab #2 SQL injection vulnerability allowing login bypass 33m
  • Exercise: Which SQL injection payload is used to bypass authentication by commenting out the password check?
  • Video class: SQL Injection - Lab #3 SQLi UNION attack determining the number of columns returned by the query 34m
  • Exercise: In a SQL injection UNION attack, what is the first key step needed to successfully extract data from other tables?
  • Video class: SQL Injection - Lab #4 SQL injection UNION attack, finding a column containing text 29m
  • Exercise: In a UNION-based SQL injection attack, why do you test each column with a text value (e.g., abc) after finding the number of columns?
  • Video class: SQL Injection - Lab #5 SQL injection UNION attack, retrieving data from other tables 25m
  • Exercise: In a UNION-based SQL injection used to extract credentials from a separate table, what must match between the injected SELECT and the original query?
  • Video class: SQL Injection - Lab #6 SQL injection UNION attack, retrieving multiple values in a single column 29m
  • Exercise: In a UNION-based SQL injection where only one column is displayed but you need both username and password, what technique lets you retrieve both in a single column?
  • Video class: SQL Injection - Lab #7 SQL injection attack, querying the database type and version on Oracle 27m
  • Exercise: In an Oracle UNION-based SQL injection, what is required for a SELECT statement when you are not extracting data from a real table?
  • Video class: SQL Injection - Lab #8 SQLi attack, querying the database type and version on MySQL 22m
  • Exercise: In a UNION-based SQL injection against a MySQL/Microsoft target, which payload is used to display the database version string?
  • Video class: SQL Injection - Lab #9 SQL injection attack, listing the database contents on non Oracle databases 45m
  • Exercise: In a UNION-based SQL injection used to list database contents on non-Oracle databases, what is the first step to make the UNION query work correctly?
  • Video class: SQL Injection - Lab #10 SQL injection attack, listing the database contents on Oracle 40m
  • Video class: SQL Injection - Lab #11 Blind SQL injection with conditional responses 48m
  • Exercise: In a blind SQL injection with conditional responses, what indicates that an injected condition evaluated to TRUE?
  • Video class: SQL Injection - Lab #12 Blind SQL injection with conditional errors 45m
  • Exercise: In blind SQL injection with conditional errors, what indicates a TRUE condition when testing the injected predicate?
  • Video class: SQL Injection - Lab #13 Blind SQL injection with time delays 19m
  • Exercise: In a blind SQL injection lab where query results are not returned and the response does not change for errors or empty results, what technique can be used to confirm the vulnerability?
  • Video class: SQL Injection - Lab #14 Blind SQL injection with time delays and information retrieval 35m
  • Exercise: In a blind SQL injection scenario where query results and errors are not reflected, what technique can be used to infer data when the query is executed synchronously?
  • Video class: SQL Injection - Lab #15 Blind SQL injection with out-of-band interaction 10m
  • Exercise: In a blind SQL injection scenario where the SQL query runs asynchronously and does not affect the HTTP response, what technique can confirm successful exploitation?
  • Video class: SQL Injection - Lab #16 Blind SQL injection with out of band data exfiltration | Long Version 08m
  • Exercise: In a blind SQL injection lab where the vulnerable input is a TrackingId cookie and responses don’t change, what technique is used to extract the administrator password?
  • Video class: SQL Injection - Lab #17 SQL injection with filter bypass via XML encoding | Long Version 08m
  • Exercise: In a SQL injection lab where a WAF blocks obvious payloads in an XML stock-check request, what technique can be used to bypass the filter?
  • Video class: SQL Injection - Lab #18 Visible error-based SQL injection | Long Version 16m

This free course includes:

9 hours and 42 minutes of online video course

Digital certificate of course completion (Free)

Exercises to train your knowledge

100% free, from content to certificate

Ready to get started?Download the app and get started today.

Install the app now

to access the course
Icon representing technology and business courses

Over 5,000 free courses

Programming, English, Digital Marketing and much more! Learn whatever you want, for free.

Calendar icon with target representing study planning

Study plan with AI

Our app's Artificial Intelligence can create a study schedule for the course you choose.

Professional icon representing career and business

From zero to professional success

Improve your resume with our free Certificate and then use our Artificial Intelligence to find your dream job.

You can also use the QR Code or the links below.

QR Code - Download Cursa - Online Courses

More free courses at Cyber Security

Free Ebook + Audiobooks! Learn by listening or reading!

Download the App now to have access to + 5000 free courses, exercises, certificates and lots of content without paying anything!

  • 100% free online courses from start to finish

    Thousands of online courses in video, ebooks and audiobooks.

  • More than 60 thousand free exercises

    To test your knowledge during online courses

  • Valid free Digital Certificate with QR Code

    Generated directly from your cell phone's photo gallery and sent to your email

Cursa app on the ebook screen, the video course screen and the course exercises screen, plus the course completion certificate