My Hands-On SQL Home Lab

My Hands-On SQL Home Lab

Hello, and welcome to another installment of my journey to becoming a Cybersecurity Professional.


The past week and a half have been spent on learning and validating my understanding of the content within the 'Intro to IT' course (D322) at WGU. I've thoroughly enjoyed the process of reading and taking notes with Obsidian. Earlier this week, I took my Pre-Assessment (PA) for the course and passed! However, I'd like to make sure I do as well as I can on the Objective Assessment (OA) and will be writing a few articles covering the concepts learned within the course.


With that said, here are a few takeaways from my review of the PA:

???1. I am a bit weak on SQL, and its commands.

???2. The Project Management and System Development Life Cycle are a little more involved than I originally thought!


Today's brief article will focus on documenting my practical hands-on experience with SQL.


I researched and reviewed a bit with w3schools and YouTube videos before I landed on a video that I thought would work out for me. Since I've started using VMware as my primary hypervisor, I looked for a Windows 11 virtual machine. A brief search showed me where to download a Windows 11 Enterprise developer evaluation edition from Microsoft.


No alt text provided for this image
Using VMware to set up an evaluation edition of Microsoft Windows 11 Enterprise Edition.



After downloading and setting up the VM, through Windows 11, I went ahead and downloaded/installed the Microsoft SQL Server, the SQL Server Management Studio (SSMS), and a sample database to learn from.

No alt text provided for this image
Installing SQL Server 2022 onto my Windows 11 VM.


No alt text provided for this image
Lastly, installing the SSMS!


Below is the window you see upon installation of the server. Since I am doing all of my learning through the SSMS, I didn't spend much time here.

No alt text provided for this image
Opening up the SQL Server to confirm that it's working.


After loading the database I had installed (it took some time to find it, unfortunately), I was presented with a functional database to practice my SQL queries with!

It is one thing to read, but a whole other thing to use what you theoretically learned practically. Here we see my query that selects the Customer Name table from dbo.Customers (the dbo. can change to anything you'd like, as I've learned).

And now we will do another query, asking to have the Customer Name and the accompanying notes displayed. I've learned that this is considered an "implicit join". Note that this brings about a syntax error, due to improper format not using KCC to identify the database.


No alt text provided for this image
Error example.



Lets fix that real quick..

No alt text provided for this image
Fixing the query error.

There we go! Now we can see the data that was requested.

No alt text provided for this image
Fixing the database query error allowed me to see the requested data.



I then learned that you can change the column names to fit your desired output. It doesn't change the actual database, just the output. #cybersecurityrocks

No alt text provided for this image
Changing the table title, via the query.


Now I will do my first asterisk request "select all".

No alt text provided for this image
An asterisk means "everything" is requested.



After learning and applying several different queries that I won't bore you with, I was introduced to the Query Designer. This makes any database query absolutely doable and available to any individual, regardless of their experience level.

No alt text provided for this image
The Query Designer makes childs play out of even the most demanding of queries.



Overall, I'm happy that I decided to invest some time in this. Before doing so, it was all just words on a page that meant nothing to me except in a theoretical sense to pass an exam. Now, I at least have some experience using SQL!


On to Project Management and System Development Life Cycles!


A big thank you to Kevin Stratvert and his YouTube video detailing how all of this works, and how to set it up. (https://www.youtube.com/watch?v=h0nxCDiD-zg)

Dwayne Sudduth

Experienced Technical Analyst and Project Manager with a passion for driving successful outcomes and exceeding project goals.

1 年

You can also utilize a 'use' statement to indicate the database you wish to query: use kcc select * from dbo.whatever where {some criteria}{operator}{some criteria} Wait until you start playing around with joins.

Jason H.

Building the Core of Tomorrow, Powering Up Future Energy Systems, Securing Critical Infrastructure with Cyber Resilience, Accelerating AI Evolution.

1 年

Cool Lab, I’ll share some SQL content with you I’m working on when it’s done

要查看或添加评论,请登录

James S.的更多文章

  • OAuth 2.0 - Authentication Bypass via OAuth implicit flow

    OAuth 2.0 - Authentication Bypass via OAuth implicit flow

    Since we've gone over the basics of what OAuth is, and its common grant types, let's discuss the first vulnerability…

  • What is OAuth, and what are grant types?

    What is OAuth, and what are grant types?

    Today I'm shifting my focus from Active Directory to web applications, by diving into Open Authorization (OAuth2.0).

    2 条评论
  • Active Directory Attack - SMB Relay

    Active Directory Attack - SMB Relay

    The next common attack I am covering is SMB Relay. Using once again TCM Security's YouTube video as a guide, the setup…

    3 条评论
  • Web Security Academy Blind SQLi with conditional responses.

    Web Security Academy Blind SQLi with conditional responses.

    Hello everyone! It has been awhile since my last article, and while doing a lab on Portswigger's Web Security Academy…

    1 条评论
  • File Integrity Monitoring: Powershell Edition Pt. II

    File Integrity Monitoring: Powershell Edition Pt. II

    Hello everyone, welcome to Part II! (If you've not read Part I yet, you may do so here.) I'd like to start off by…

  • File Integrity Monitoring: Powershell Edition Pt. 1

    File Integrity Monitoring: Powershell Edition Pt. 1

    Hello everyone! I'd like to start off by giving credit where credit is due: Josh Madakor created the original script…

  • Web Application Front-End Vulnerabilities

    Web Application Front-End Vulnerabilities

    Continuing with my education on Web Application Security, I'd like to showcase four main vulnerabilities examined by…

    2 条评论
  • Active Directory Home Lab

    Active Directory Home Lab

    Hello everyone, I'd like to share some of the setup of my Active Directory home lab. This all started with a casual…

  • Information Security, Access Control, and the Parkerian Hexad..oh my!

    Information Security, Access Control, and the Parkerian Hexad..oh my!

    Happy Sunday everyone! Today I will be focusing on what I have learned in the first part of my new "Fundamentals of…

  • ARP Spoofing Lab

    ARP Spoofing Lab

    Hello all! Yesterday was spent in the truck headed home, and thus only podcasts. I learned quite a bit about the latest…

    3 条评论

社区洞察

其他会员也浏览了