Sws101_unit3_journal
Introduction For unit 3 journal, we have go through Try Hack Me room OWASP Top 10-2021. In this room, we are going to learn about OWASP topicthat includes details on the vulnerabilities,how they oc...
Introduction For unit 3 journal, we have go through Try Hack Me room OWASP Top 10-2021. In this room, we are going to learn about OWASP topicthat includes details on the vulnerabilities,how they oc...
Advanced Aggregation Functions 1.Ranking This function returns the rank of the values in the group of values.The rank is equal to one plus the number of rows that come before it but are not on the...
Tier 0 This is the essential step toward the world of cyber security pen-testing. In this machine, I learned how to connect to services such as FTP, SMS, Telnet, Rsync and RDP anonymously. And thi...
Introduction to Cyber Security 1. Offensive Security The practice of actively testing the security measures of the system, network, or application with the intention of finding vulnerabilities. ...
Bandit level 0 Username : bandit0 Password : bandit0 Bandit level 0-1 Username : bandit1 Password : NH2SXQwcBdpmTEzi3bvBHMM9H66vVXjL Bandit level 1 - 2 Username : bandit2 password : rRGizSa...
Null values in SQL NULL represents the non-existent values in SQL but it is not the same as empty space in string data types and zero in int data type. Null values can be inserted into a column if ...
Entity relationship diagrams (ERD) It is a type of flowchart that illustrates the relationship between entities. Each of these entities and its related entities are denoted using simple shapes con...
Database User and Administrator What I learned during flipped class Database users are grouped into various types mainly based on their interaction with the database system, roles and responsibil...