COURSE AUTHOR – Istiak Ahamed Sishir
Last Updated on October 8, 2022 by GeeksGod
1. Information gathering 2. Vulnerability analysis 3. SQL mapping 4. Information assurance model 5. Introducing metasploit in kali linux 6. Hashes and passwords 7. Classic and modern encryption