Search this site
Skip to main content
Skip to navigation
WEB
_______________
Security
Operations Security
Telecommunications & Network Security
Business Continuity and Disaster Recovery Planning
Crittography
Information Security Governance and Risk Management
Security Architecture and Design
Access Control
Physical Security
Software Development Security
Legal, Regulations, Investigations and Compliance
Privacy
Awareness
_______________
Lectures
Information Gathering
OSINT: Fonti e Notizie
OSINT: Ciclo di intelligence
OSINT: Tecnologia
Agile Development
Big Data
Cloud Computing Introduction
Cloud Computing
Cloud Computing Examples
Business Continuity & Disaster Recovery
Business Continuity & Disaster Recovery Cloud Scenario
Labs
Google Search
1 - Introduction
2 - Interpreting results
3 - Advanced techniques
4 - Find facts faster
5 - Checking facts
6 - Putting it all together
Security Expert
01 - Introduction to System Security
02 - Footprinting and Reconnaissance
I. Network Route Trace Using Path Analyzer Pro
II. Mirroring Websites Using the HTTrack Web Site Copier Tool
III. Extracting a Company’s Data Using Web Data Extractor
03 - Scanning Networks
04 - Enumeration
05 - System Hacking
06 - Trojans and Backdoors
07 - Viruses and Worms
08 - Sniffing
09 - Social Engineering
10 - Denial of Service
11 - Session Hijacking
12 - Hijacking Webservers
13 - Hacking Web Applications
14 - SQL Injection
15 - Hacking Wireless Networks
16 - Hacking Mobile Platforms
17 - Evading IDS, Firewalls, and Honeypots
18 - Buffer Overflow
19 - Cryptography
20 - Penetration Testing
Cyber Scenarios
WEB
BC-DR in Cloud Scenario
AGENDA
Regions and Zones
Cloud services
Configuration examples
Report abuse
Report abuse