-
9.1 Inside Web Apps
-
Video
9.1.1 Inside Web Apps
-
Check for Understanding
9.1.2 Inside Web Apps
-
Free Response
9.1.3 Using View Page Source
-
Example
9.1.4 Recreate a Webpage?
-
Connection
9.1.5 Getting Started with OWASP
-
Free Response
9.1.6 Getting Started with OWASP
-
9.2 Developer Tools
-
Video
9.2.1 Developer Tools
-
Check for Understanding
9.2.2 Developer Tools
-
Free Response
9.2.3 Using the Developer Tools
-
Exercise
9.2.4 Console Secrets
-
Example
9.2.5 Local Storage
-
Connection
9.2.6 The Top Cybersecurity Blogs and Websites
-
Free Response
9.2.7 Selecting a Site to Follow
-
9.3 The Value of Data
-
Video
9.3.1 The Value of Data
-
Check for Understanding
9.3.2 The Value of Data Quiz
-
Notes
9.3.3 Exploring Data Visualizations
-
Connection
9.3.4 US Recorded Music Revenue
-
Connection
9.3.5 National Parks
-
Connection
9.3.6 March Madness
-
Connection
9.3.7 Captain Marvel
-
Free Response
9.3.8 Respond: Visualizations
-
Free Response
9.3.9 Free Response: Choosing a Visualization
-
Free Response
9.3.10 Reflection: Design a Survey
-
9.4 Databases
-
Video
9.4.1 Databases
-
Check for Understanding
9.4.2 Databases
-
Connection
9.4.3 Database Administrator Career
-
Free Response
9.4.4 Database Administrator Career
-
Video
9.4.5 Parts of a Database
-
Check for Understanding
9.4.6 Parts of a Database
-
Connection
9.4.7 SQL Database Diagram
-
Free Response
9.4.8 SQL Database Diagram
-
Free Response
9.4.9 Schema Brainstorm
-
9.5 Clients and Servers
-
Video
9.5.1 Clients and Servers
-
Check for Understanding
9.5.2 Clients and Servers
-
Connection
9.5.3 Inside a Google Data Center
-
Free Response
9.5.4 Inside a Google Data Center
-
Connection
9.5.5 Cloud Vulnerabilities
-
Free Response
9.5.6 Cloud Vulnerabilities Response
-
Video
9.5.7 Client-Server Model
-
Check for Understanding
9.5.8 Client-Server Model
-
Connection
9.5.9 The Future of User Privacy
-
Free Response
9.5.10 The Future of User Privacy
-
9.6 What is SQL?
-
Notes
9.6.1 What is SQL Overview
-
Video
9.6.2 Intro to SQL
-
Check for Understanding
9.6.3 Quiz: What is SQL?
-
Video
9.6.4 How to Structure Data in SQL
-
Check for Understanding
9.6.5 How to Structure Data in SQL
-
Example
9.6.6 SQL Tables
-
Free Response
9.6.7 SQL Tables Response
-
9.7 Basic Querying in SQL
-
Video
9.7.1 The SELECT Statement
-
Check for Understanding
9.7.2 Basic Querying in SQL
-
Example
9.7.3 Our First SELECT Statement
-
Exercise
9.7.4 Your First SELECT Statement
-
Video
9.7.5 More SELECT Statement
-
Check for Understanding
9.7.6 More SELECT Statement
-
Example
9.7.7 Selecting Specific Columns
-
Exercise
9.7.8 Harry Potter Names
-
9.8 Filtering Queries in SQL
-
Video
9.8.1 The WHERE Clause
-
Check for Understanding
9.8.2 Condition Operators
-
Example
9.8.3 Ravenclaw House
-
Example
9.8.4 People in Gryffindor
-
Example
9.8.5 Filter By ID
-
Exercise
9.8.6 The Weasleys
-
Exercise
9.8.7 The Potters
-
9.9 Common Security Problems
-
Video
9.9.1 Common Security Problems
-
Check for Understanding
9.9.2 Common Security Problems
-
Connection
9.9.3 Meet Security Engineers at Google
-
Free Response
9.9.4 Security Engineering Reflection
-
Video
9.9.5 Living in a Digital World
-
Free Response
9.9.6 Living in a Digital World
-
9.10 SQL Injection Overview
-
Video
9.10.1 SQL Injection Overview
-
Check for Understanding
9.10.2 SQL Injection Overview
-
Connection
9.10.3 Equifax Security Breach
-
Connection
9.10.4 Equifax Exposed Millions
-
Free Response
9.10.5 Equifax SQL Injection Attack
-
Example
9.10.6 SQLi
-
9.11 Types of SQLi and Prevention
-
Video
9.11.1 Types of SQLi
-
Check for Understanding
9.11.2 Types of SQLi
-
Video
9.11.3 Preventing SQLi
-
Check for Understanding
9.11.4 Preventing SQLi
-
Connection
9.11.5 Mitigating SQL Injection
-
Free Response
9.11.6 Reflection: Mitigating SQL Injection
-
Connection
9.11.7 SQL Injection Practice
-
9.12 Software Security Quiz
-
Unit Quiz
9.12.1 Software Security Quiz