| Introduction | |||
| Introduction to the course | 00:07:00 | ||
| Prerequisites for the course | |||
| Prerequisites for the course | 00:04:00 | ||
| Experiment No 1 : Perform Static Code Analysis Using an Open Source tool FLAWFIN | |||
| Static Code Analysis Using Open Source tool FLAWFINDER | 00:08:00 | ||
| Experiment No 2: Vulnerability Scanning using Nikto | |||
| Vulnerability Scanning using Nikto | 00:10:00 | ||
| Experiment No 3: To Explore a Website Copier HTTrack | |||
| To explore a website copier HTTrack | 00:07:00 | ||
| Experiment No 4: Explore Web application vulnerabilities using Wapiti | |||
| Wapiti Part1 | 00:06:00 | ||
| Wapiti Part 2 | 00:06:00 | ||
| Experiment No 5: Perform SQL Injection | |||
| SQLMap Part 1 | 00:12:00 | ||
| SQLMap Part 2 | 00:14:00 | ||
| SQLiLABS | 00:07:00 | ||
| Experiment No 6: Penetration Testing | |||
| Metasploit Part 1 | 00:15:00 | ||
| Metasploit Part 2 | 00:06:00 | ||
| Introduction to Packet Sniffing | 00:05:00 | ||
| Packet Sniffing Using Wireshark | 00:07:00 | ||
| Introduction to ARP Spoofing | 00:09:00 | ||
| ARP Spoofing Poisoning using Ettercap | 00:08:00 | ||
| Experiment No 7: Network Security | |||
| Part 1: Routing Information Protocol (RIP) | 00:15:00 | ||
| Part 2: Access Control Lists (ACL) | 00:12:00 | ||
| Part 3: Virtual LAN (VLAN) | 00:14:00 | ||
| Experiment No 8: Email Security | |||
| Securing Messages using GNUPG | 00:17:00 | ||
| Experiment No 9: Setting up AAA Server using TACACS+ | |||
| Authentication, Authorization and Access Control using TACACS+ | 00:17:00 | ||
| Digital Forensics | |||
| Forensic Duplication and Recovery | 00:22:00 | ||
| Forensic Image Analysis using Autopsy | 00:15:00 | ||
| Assignment | |||
| Assignment – System Security & Digital Forensics Practitioner | 2 weeks, 1 day | ||
| Order Your Certificate | |||
| Order Your Certificate QLS | 00:00:00 | ||
No Reviews found for this course.