Introduction | |||
Introduction to the course | 00:07:00 | ||
Prerequisites for the course | |||
Prerequisites for the course | 00:04:00 | ||
Experiment No 1 : Perform Static Code Analysis Using an Open Source tool FLAWFIN | |||
Static Code Analysis Using Open Source tool FLAWFINDER | 00:08:00 | ||
Experiment No 2: Vulnerability Scanning using Nikto | |||
Vulnerability Scanning using Nikto | 00:10:00 | ||
Experiment No 3: To Explore a Website Copier HTTrack | |||
To explore a website copier HTTrack | 00:07:00 | ||
Experiment No 4: Explore Web application vulnerabilities using Wapiti | |||
Wapiti Part1 | 00:06:00 | ||
Wapiti Part 2 | 00:06:00 | ||
Experiment No 5: Perform SQL Injection | |||
SQLMap Part 1 | 00:12:00 | ||
SQLMap Part 2 | 00:14:00 | ||
SQLiLABS | 00:07:00 | ||
Experiment No 6: Penetration Testing | |||
Metasploit Part 1 | 00:15:00 | ||
Metasploit Part 2 | 00:06:00 | ||
Introduction to Packet Sniffing | 00:05:00 | ||
Packet Sniffing Using Wireshark | 00:07:00 | ||
Introduction to ARP Spoofing | 00:09:00 | ||
ARP Spoofing Poisoning using Ettercap | 00:08:00 | ||
Experiment No 7: Network Security | |||
Part 1: Routing Information Protocol (RIP) | 00:15:00 | ||
Part 2: Access Control Lists (ACL) | 00:12:00 | ||
Part 3: Virtual LAN (VLAN) | 00:14:00 | ||
Experiment No 8: Email Security | |||
Securing Messages using GNUPG | 00:17:00 | ||
Experiment No 9: Setting up AAA Server using TACACS+ | |||
Authentication, Authorization and Access Control using TACACS+ | 00:17:00 | ||
Digital Forensics | |||
Forensic Duplication and Recovery | 00:22:00 | ||
Forensic Image Analysis using Autopsy | 00:15:00 | ||
Assignment | |||
Assignment – System Security & Digital Forensics Practitioner | 2 weeks, 1 day | ||
Order Your Certificate | |||
Order Your Certificate QLS | 00:00:00 |
Upgrade to get UNLIMITED ACCESS to ALL COURSES for only £49/year
Claim Offer & UpgradeMembership renews after 12 months. You can cancel anytime from your account.