| 1 |
Conducting research on the subject |
Hackers and Their Types, Penetration Testing, Types of Penetration Testing |
Demonstration, Show and Tell |
| 2 |
Conducting research on the subject |
What are Important Ports and Services, Information Gathering, and Discovery? |
Demonstration, Show and Tell |
| 3 |
Conducting research on the subject |
What is information gathering and discovery? |
Demonstration, Show and Tell |
| 4 |
Conducting research on the subject |
Kali Linux operating system installation and operating principles |
Demonstration, Show and Tell |
| 5 |
Conducting research on the subject |
Web Application Vulnerabilities and Weaknesses |
Demonstration, Show and Tell |
| 6 |
Conducting research on the subject |
OWASP Top 10 Vulnerabilities |
Demonstration, Show and Tell |
| 7 |
Conducting research on the subject |
OWASP Top 10 Vulnerabilities |
Demonstration, Show and Tell |
| 8 |
Conducting research on the subject |
SQL Injection Attack |
Demonstration, Show and Tell |
| 9 |
Conducting research on the subject |
SQL Injection Attack |
Demonstration, Show and Tell |
| 10 |
- |
MID-TERM EXAM |
- |
| 11 |
Conducting research on the subject |
Types of XSS and Attacks |
Demonstration, Show and Tell |
| 12 |
Conducting research on the subject |
Types of XSS and Attacks |
Demonstration, Show and Tell |
| 13 |
Conducting research on the subject |
Brute-Force Attacks |
Demonstration, Show and Tell |
| 14 |
Conducting research on the subject |
Brute-Force Attacks |
Demonstration, Show and Tell |
| 15 |
Conducting research on the subject |
General Review |
Demonstration, Show and Tell |
| 16 |
- |
FINAL EXAM |
- |
| 17 |
- |
FINAL EXAM |
- |