-
8.1 Inside Web Apps
-
Video
8.1.1 Inside Web Apps
-
Check for Understanding
8.1.2 Inside Web Apps
-
Free Response
8.1.3 Using View Page Source
-
Example
8.1.4 Recreate a Webpage?
-
Connection
8.1.5 Getting Started with OWASP
-
Free Response
8.1.6 Getting Started with OWASP
-
8.2 Developer Tools
-
Video
8.2.1 Developer Tools
-
Check for Understanding
8.2.2 Developer Tools
-
Free Response
8.2.3 Using the Developer Tools
-
Exercise
8.2.4 Console Secrets
-
Example
8.2.5 Local Storage
-
Connection
8.2.6 The Top Cybersecurity Blogs and Websites
-
Free Response
8.2.7 Selecting a Site to Follow
-
8.3 The Value of Data
-
Video
8.3.1 The Value of Data
-
Check for Understanding
8.3.2 The Value of Data Quiz
-
Notes
8.3.3 Exploring Data Visualizations
-
Connection
8.3.4 US Recorded Music Revenue
-
Connection
8.3.5 National Parks
-
Connection
8.3.6 March Madness
-
Connection
8.3.7 Captain Marvel
-
Free Response
8.3.8 Respond: Visualizations
-
Free Response
8.3.9 Free Response: Choosing a Visualization
-
Free Response
8.3.10 Reflection: Design a Survey
-
8.4 Databases
-
Video
8.4.1 Databases
-
Check for Understanding
8.4.2 Databases
-
Connection
8.4.3 Database Administrator Career
-
Free Response
8.4.4 Database Administrator Career
-
Video
8.4.5 Parts of a Database
-
Check for Understanding
8.4.6 Parts of a Database
-
Connection
8.4.7 SQL Database Diagram
-
Free Response
8.4.8 SQL Database Diagram
-
Free Response
8.4.9 Schema Brainstorm
-
8.5 Clients and Servers
-
Video
8.5.1 Clients and Servers
-
Check for Understanding
8.5.2 Clients and Servers
-
Connection
8.5.3 Inside a Google Data Center
-
Free Response
8.5.4 Inside a Google Data Center
-
Connection
8.5.5 Cloud Vulnerabilities
-
Free Response
8.5.6 Cloud Vulnerabilities Response
-
Video
8.5.7 Client-Server Model
-
Check for Understanding
8.5.8 Client-Server Model
-
Connection
8.5.9 The Future of User Privacy
-
Free Response
8.5.10 The Future of User Privacy
-
8.6 What is SQL?
-
Notes
8.6.1 What is SQL Overview
-
Video
8.6.2 Intro to SQL
-
Check for Understanding
8.6.3 Quiz: What is SQL?
-
Video
8.6.4 How to Structure Data in SQL
-
Check for Understanding
8.6.5 How to Structure Data in SQL
-
Example
8.6.6 SQL Tables
-
Free Response
8.6.7 SQL Tables Response
-
8.7 Basic Querying in SQL
-
Video
8.7.1 The SELECT Statement
-
Check for Understanding
8.7.2 Basic Querying in SQL
-
Example
8.7.3 Our First SELECT Statement
-
Exercise
8.7.4 Your First SELECT Statement
-
Video
8.7.5 More SELECT Statement
-
Check for Understanding
8.7.6 More SELECT Statement
-
Example
8.7.7 Selecting Specific Columns
-
Exercise
8.7.8 Harry Potter Names
-
8.8 Filtering Queries in SQL
-
Video
8.8.1 The WHERE Clause
-
Check for Understanding
8.8.2 Condition Operators
-
Example
8.8.3 Ravenclaw House
-
Example
8.8.4 People in Gryffindor
-
Example
8.8.5 Filter By ID
-
Exercise
8.8.6 The Weasleys
-
Exercise
8.8.7 The Potters
-
8.9 Common Security Problems
-
Video
8.9.1 Common Security Problems
-
Check for Understanding
8.9.2 Common Security Problems
-
Connection
8.9.3 Meet Security Engineers at Google
-
Free Response
8.9.4 Security Engineering Reflection
-
Video
8.9.5 Living in a Digital World
-
Free Response
8.9.6 Living in a Digital World
-
8.10 SQL Injection Overview
-
Video
8.10.1 SQL Injection Overview
-
Check for Understanding
8.10.2 SQL Injection Overview
-
Connection
8.10.3 Equifax Security Breach
-
Connection
8.10.4 Equifax Exposed Millions
-
Free Response
8.10.5 Equifax SQL Injection Attack
-
Example
8.10.6 SQLi
-
8.11 Types of SQLi and Prevention
-
Video
8.11.1 Types of SQLi
-
Check for Understanding
8.11.2 Types of SQLi
-
Video
8.11.3 Preventing SQLi
-
Check for Understanding
8.11.4 Preventing SQLi
-
Connection
8.11.5 Mitigating SQL Injection
-
Free Response
8.11.6 Reflection: Mitigating SQL Injection
-
Connection
8.11.7 SQL Injection
-
8.12 Software Security Quiz
-
Unit Quiz
8.12.1 Software Security Quiz