Course Curriculum
(W26M1) Reconnaissance and information gathering | 00:00:00 | ||
(W26M2) Network Scanning: The Basics | 00:00:00 | ||
(W26M3) Exploitation | 00:00:00 | ||
(W26M4) Postexploitation | 00:00:00 | ||
(W26M5) Basics of SQL Injection for different databases | 00:00:00 | ||
(W26M6) The Concept of Vulnerability Type SQLi | 00:00:00 | ||
(W26M7) Cross-site Scripting | 00:00:00 |