top of page
Search
![](https://static.wixstatic.com/media/870b67_e72c700b5d0d4cf7b05403b0f7bbdb7d~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/870b67_e72c700b5d0d4cf7b05403b0f7bbdb7d~mv2.webp)
![Class Notes 8 - Kali Linux important commands and more](https://static.wixstatic.com/media/870b67_e72c700b5d0d4cf7b05403b0f7bbdb7d~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/870b67_e72c700b5d0d4cf7b05403b0f7bbdb7d~mv2.webp)
Sai Narayan
Sep 26, 20232 min read
Class Notes 8 - Kali Linux important commands and more
Download material here Title: Essential Commands in Kali Linux: A Primer Kali Linux, developed by Offensive Security, is a Debian-derived...
21 views0 comments
![](https://static.wixstatic.com/media/870b67_dd76763ce62947f2ad05c94a23bdd9f1~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/870b67_dd76763ce62947f2ad05c94a23bdd9f1~mv2.webp)
![Class Notes Day 7 - Injection attacks from OWASP top 10 and more](https://static.wixstatic.com/media/870b67_dd76763ce62947f2ad05c94a23bdd9f1~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/870b67_dd76763ce62947f2ad05c94a23bdd9f1~mv2.webp)
Sai Narayan
Sep 22, 20232 min read
Class Notes Day 7 - Injection attacks from OWASP top 10 and more
Download material here **Injection Attacks - A Deep Dive** *Introduction:* Injection attacks exploit an application by inserting...
33 views0 comments
![](https://static.wixstatic.com/media/870b67_6058726c06254b378a0a44c45f1063ca~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/870b67_6058726c06254b378a0a44c45f1063ca~mv2.webp)
![Class Notes Day 6 - practical of confidentiality, integrity and availability and more](https://static.wixstatic.com/media/870b67_6058726c06254b378a0a44c45f1063ca~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/870b67_6058726c06254b378a0a44c45f1063ca~mv2.webp)
Sai Narayan
Sep 21, 20232 min read
Class Notes Day 6 - practical of confidentiality, integrity and availability and more
Download material here ### 1. Practical Implementation of Confidentiality Impact Using Nikto #### a. Practical Analysis of Path Traversal...
30 views0 comments
![](https://static.wixstatic.com/media/870b67_e173b3f536754d099dddbc1ae1ad779e~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/870b67_e173b3f536754d099dddbc1ae1ad779e~mv2.webp)
![Class Notes Day 5 - End of life components, SSL Cert, TCP and UDP and more](https://static.wixstatic.com/media/870b67_e173b3f536754d099dddbc1ae1ad779e~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/870b67_e173b3f536754d099dddbc1ae1ad779e~mv2.webp)
Sai Narayan
Sep 21, 20234 min read
Class Notes Day 5 - End of life components, SSL Cert, TCP and UDP and more
Download Material here ### 1. Concept of End of Life Components In the realm of cybersecurity, "End of Life (EOL)" refers to the point in...
14 views0 comments
![](https://static.wixstatic.com/media/870b67_6c9a05a9ed834bbcb648ad8cd2b330fa~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/870b67_6c9a05a9ed834bbcb648ad8cd2b330fa~mv2.webp)
![Class Notes Day 4 - Open Source Reconnaissance Tools](https://static.wixstatic.com/media/870b67_6c9a05a9ed834bbcb648ad8cd2b330fa~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/870b67_6c9a05a9ed834bbcb648ad8cd2b330fa~mv2.webp)
Sai Narayan
Sep 21, 20233 min read
Class Notes Day 4 - Open Source Reconnaissance Tools
Download material here Certainly! Below, you'll find an introduction and the basic workings of each of the listed cybersecurity tools:...
15 views0 comments
![](https://static.wixstatic.com/media/870b67_b531b8ec6ebf49c994c071e4c59d76cf~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/870b67_b531b8ec6ebf49c994c071e4c59d76cf~mv2.webp)
![Class Notes Day 3 - Confidentiality, Integrity and More](https://static.wixstatic.com/media/870b67_b531b8ec6ebf49c994c071e4c59d76cf~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/870b67_b531b8ec6ebf49c994c071e4c59d76cf~mv2.webp)
Sai Narayan
Sep 21, 20233 min read
Class Notes Day 3 - Confidentiality, Integrity and More
Download material here Absolutely, here is detailed content for each of your requested topics: ### 1. Confidentiality Confidentiality in...
15 views0 comments
![](https://static.wixstatic.com/media/870b67_e0e8a8f6aa96423b8423b40a0a400dbb~mv2.jpeg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/870b67_e0e8a8f6aa96423b8423b40a0a400dbb~mv2.webp)
![Class Notes Day 2 - How does VAPT work and tools like Zap proxy and more](https://static.wixstatic.com/media/870b67_e0e8a8f6aa96423b8423b40a0a400dbb~mv2.jpeg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/870b67_e0e8a8f6aa96423b8423b40a0a400dbb~mv2.webp)
Sai Narayan
Sep 21, 20234 min read
Class Notes Day 2 - How does VAPT work and tools like Zap proxy and more
Download Material here How does a Enterprise VAPT takes place ? What is a report and its findings. Detailed discussion on : False...
31 views0 comments
![](https://static.wixstatic.com/media/870b67_48bba931bee34b82818e4a8e02656977~mv2.jpg/v1/fill/w_250,h_250,fp_0.50_0.50,q_30,blur_30,enc_auto/870b67_48bba931bee34b82818e4a8e02656977~mv2.webp)
![Class Notes Day 1 - Websites, Banking Security scenarios and more](https://static.wixstatic.com/media/870b67_48bba931bee34b82818e4a8e02656977~mv2.jpg/v1/fill/w_454,h_341,fp_0.50_0.50,q_90,enc_auto/870b67_48bba931bee34b82818e4a8e02656977~mv2.webp)
Sai Narayan
Sep 21, 20233 min read
Class Notes Day 1 - Websites, Banking Security scenarios and more
Hack a Bank Scenario – what to look for before the attack – Download Material What to know about the Bank before trying to target its...
75 views0 comments
bottom of page