COMPUTER NETWORK SECURITY FROM SCRATCH
- Creating public/private keys, certificate requests, client authentication, code signing etc.
- Writing secure web apps to implement the element of confidentiality, integrity, and availability of basic security services
- Configuring firewalls and IDS for secure network systems
MOHAMMAD ADLY
Ph. D., “Enhanced Congestion Control for Internet Media Traffic”, Computer Engineering and Sciences Dept., Faculty of Electronic Engineering, Menofiya University, 2006 – 2013. M. Sc., “Video Services for Distant Work in an IP Environment”, Computer Engineering and Sciences Dept., Faculty of Electronic Engineering, Menoufiya University, 2002 – 2005.
WEB SECURITY COMMON VULNERABILITIES & THEIR MITIGATION
- Security attacks such as Cross Site Scripting, Session Hijacking, Credential Management, Cross Site Request Forgery, SQL Injection, Direct Object Reference, Social Engineering
- Risk mitigation using the Content Security Policy Header, user input validation and sanitization, secure token validation, sandboxed iframes, secure sessions and expiry, password recovery
- Web security basics: Two factor authentication, Open Web Application Security Project
LOONYCORN
Loonycorn is a team by Janani Ravi and Vitthal Srinivasan, product of Stanford University and IIM Ahmedabad. They hold several years of working experience in the field of technology in Bay Area, New York, Singapore and Bangalore. Janani Ravi: 7 Years of work experience (Google, Flipkart and Microsoft) Vitthal Srinivasan: Worked at Google, Flipkart, Credit Suisse and INSEAD
LEARN ETHICAL HACKING FROM SCRATCH
- Ethical Hacking and Computer Security 120 Videos
- Learn about what exactly is ethical hacking about and computer security
- Different ethical hacking fields
ZAID SABIH
Ethical Hacker, Pen tester & Computer Scientist and the founder and CTO of zSecurity. Holds superb revel in ethical hacking, commenced making video tutorials back in 2009 in a moral hacking community (iSecuri1ty), and additionally labored as a pen-tester for the identical enterprise.
LEARN WEBSITE HACKING PENETRATION TESTING FROM SCRATCH
- Information Gathering
- Discovering, Exploiting & Fixing
- Code Execution
- Local File inclusion
ZAID SABIH
Ethical Hacker, Pen tester & Computer Scientist and the founder and CTO of zSecurity. Holds superb revel in ethical hacking, commenced making video tutorials back in 2009 in a moral hacking community (iSecuri1ty), and additionally labored as a pen-tester for the identical enterprise.
NETWORK HACKING CONTINUED INTERMEDIATE TO ADVANCED
- Pre- Connection Attacks
- Gaining Access
- Captive Portals
ZAID SABIH
Ethical Hacker, Pen tester & Computer Scientist and the founder and CTO of zSecurity. Holds superb revel in ethical hacking, commenced making video tutorials back in 2009 in a moral hacking community (iSecuri1ty), and additionally labored as a pen-tester for the identical enterprise.
Reviews
There are no reviews yet.