Ethical hacking

My Table

Unit 1

S No. Course Content:
0 Ethical Hacking
1 Hacking Impacts
2 The Hacker Framework: Planning the test
3 Sound Operations
4 Reconnaissance
5 Enumeration
6 Vulnerability Analysis
7 Exploitation
8 Final Analysis
9 Deliverable
10 Integration Information Security Models: Computer Security
11 Network Security
12 Service Security
13 Application Security
14 Security Architecture Information Security Program: The Process of Information Security
15 Component Parts of Information Security Program
16 Risk Analysis and Ethical Hacking

Comments

Popular posts from this blog

OpenSolaris and Linux virtual memory and address space structures

Tagged architectures and multi-level UNIX

Tying top-down and bottom-up object and memory page lookups with the actual x86 page translation and segmentation