-
14.1 Inside Web Apps
-
Video
14.1.1 Inside Web Apps
-
Check for Understanding
14.1.2 Inside Web Apps
-
Free Response
14.1.3 Using View Page Source
-
Example
14.1.4 Recreate a Webpage?
-
Connection
14.1.5 Getting Started with OWASP
-
Free Response
14.1.6 Getting Started with OWASP
-
14.2 Developer Tools
-
Video
14.2.1 Developer Tools
-
Check for Understanding
14.2.2 Developer Tools
-
Free Response
14.2.3 Using the Developer Tools
-
Exercise
14.2.4 Console Secrets
-
Example
14.2.5 Local Storage
-
Connection
14.2.6 The Top Cybersecurity Blogs and Websites
-
Free Response
14.2.7 Selecting a Site to Follow
-
14.3 The Value of Data
-
Video
14.3.1 The Value of Data
-
Check for Understanding
14.3.2 The Value of Data Quiz
-
Notes
14.3.3 Exploring Data Visualizations
-
Connection
14.3.4 US Recorded Music Revenue
-
Connection
14.3.5 National Parks
-
Connection
14.3.6 March Madness
-
Connection
14.3.7 Captain Marvel
-
Free Response
14.3.8 Respond: Visualizations
-
Free Response
14.3.9 Free Response: Choosing a Visualization
-
Free Response
14.3.10 Reflection: Design a Survey
-
14.4 Databases
-
Video
14.4.1 Databases
-
Check for Understanding
14.4.2 Databases
-
Connection
14.4.3 Database Administrator Career
-
Free Response
14.4.4 Database Administrator Career
-
Video
14.4.5 Parts of a Database
-
Check for Understanding
14.4.6 Parts of a Database
-
Connection
14.4.7 SQL Database Diagram
-
Free Response
14.4.8 SQL Database Diagram
-
Free Response
14.4.9 Schema Brainstorm
-
14.5 Clients and Servers
-
Video
14.5.1 Clients and Servers
-
Check for Understanding
14.5.2 Clients and Servers
-
Connection
14.5.3 Inside a Google Data Center
-
Free Response
14.5.4 Inside a Google Data Center
-
Connection
14.5.5 Cloud Vulnerabilities
-
Free Response
14.5.6 Cloud Vulnerabilities Response
-
Video
14.5.7 Client-Server Model
-
Check for Understanding
14.5.8 Client-Server Model
-
Connection
14.5.9 The Future of User Privacy
-
Free Response
14.5.10 The Future of User Privacy
-
14.6 What is SQL?
-
Notes
14.6.1 What is SQL Overview
-
Video
14.6.2 Intro to SQL
-
Check for Understanding
14.6.3 Quiz: What is SQL?
-
Video
14.6.4 How to Structure Data in SQL
-
Check for Understanding
14.6.5 How to Structure Data in SQL
-
Example
14.6.6 SQL Tables
-
Free Response
14.6.7 SQL Tables Response
-
14.7 Basic Querying in SQL
-
Video
14.7.1 The SELECT Statement
-
Check for Understanding
14.7.2 Basic Querying in SQL
-
Example
14.7.3 Our First SELECT Statement
-
Exercise
14.7.4 Your First SELECT Statement
-
Video
14.7.5 More SELECT Statement
-
Check for Understanding
14.7.6 More SELECT Statement
-
Example
14.7.7 Selecting Specific Columns
-
Exercise
14.7.8 Harry Potter Names
-
14.8 Filtering Queries in SQL
-
Video
14.8.1 The WHERE Clause
-
Check for Understanding
14.8.2 Condition Operators
-
Example
14.8.3 Ravenclaw House
-
Example
14.8.4 People in Gryffindor
-
Example
14.8.5 Filter By ID
-
Exercise
14.8.6 The Weasleys
-
Exercise
14.8.7 The Potters
-
14.9 Common Security Problems
-
Video
14.9.1 Common Security Problems
-
Check for Understanding
14.9.2 Common Security Problems
-
Connection
14.9.3 Meet Security Engineers at Google
-
Free Response
14.9.4 Security Engineering Reflection
-
Video
14.9.5 Living in a Digital World
-
Free Response
14.9.6 Living in a Digital World
-
14.10 SQL Injection Overview
-
Video
14.10.1 SQL Injection Overview
-
Check for Understanding
14.10.2 SQL Injection Overview
-
Connection
14.10.3 Equifax Security Breach
-
Connection
14.10.4 Equifax Exposed Millions
-
Free Response
14.10.5 Equifax SQL Injection Attack
-
Example
14.10.6 SQLi
-
14.11 Types of SQLi and Prevention
-
Video
14.11.1 Types of SQLi
-
Check for Understanding
14.11.2 Types of SQLi
-
Video
14.11.3 Preventing SQLi
-
Check for Understanding
14.11.4 Preventing SQLi
-
Connection
14.11.5 Mitigating SQL Injection
-
Free Response
14.11.6 Reflection: Mitigating SQL Injection
-
Connection
14.11.7 SQL Injection Practice
-
14.12 Software Security Quiz
-
Unit Quiz
14.12.1 Software Security Quiz