Book Content
chapters • 7h40m total length
1. PYTHON WITH PENETRATION TESTING AND NETWORKING
2. SCANNING PENTESTING
3. SNIFFING AND PENETRATION TESTING
4. Network Attacks and Prevention
5. WIRELESS PENTESTING
6. Honeypot, Building A Trap for attackers
7. FOOTPRINTING OF A WEB SERVER AND A WEB APPLICATION
8. CLIENT-SIDE AND DDOS ATTACKS
9. PENTESTING OF SQLI AND XSS














