Category: Elearning

Category: Elearning

Gathering Penetration Testing Intelligence from Network and Application Platform Configuration
June 1, 2021 Cyber defense, cybersecurity, Elearning, Online security, Penetration testing, Pentest, System security, Web frameworks admin

Network configuration refers to the process of setting a network’s controls, flow, and operation to support the network infrastructure of an organization or for an individual owner. Components of a computing network include Internet/network protocols, software or application, firewall, routers, and others that perform related tasks. Most network configurations are designed to meet communication objectives.

Read More
Security Implication of Web Frameworks
May 18, 2021 Cyber defense, cybersecurity, Elearning, Online security, Penetration testing, Pentest, System security, Web frameworks admin

Web application frameworks provide a structure for building and developing applications through the provision of predefined classes, modules, and functions. The predefined classes and modules help to manage system hardware, software and to manage the streamlining of the application development process. The framework in this discussion includes application frameworks such as Angular.js or Django and

Read More
Approaches to Penetration Testing
April 7, 2021 Cyber defense, cybersecurity, Elearning, Online security, Penetration testing, System security admin

The need to discuss testing is borne out of the desire to ensure the safe and secure use of the software. Almost everyone that has access to the internet uses some software or the other. The pandemic era has even made the use of computer software more prevalent than any other time since the origin

Read More
Selection of Tools for Penetration Testing
June 30, 2020 Elearning, Online security admin

There are several types of tools for penetration testing. The number of available tools is so many that it will be practically impossible to learn all of them. Using the wrong set of tools can be a problem because the pen tester would have wasted so much time trying to gather the wrong information. As

Read More
Planning for Penetration Testing
June 23, 2020 Elearning, Online security admin

In the last episode, I described the need to test your systems to assess if it has any vulnerability, and then use the report to fix up and patch the crucial areas of importance. Penetration testing is also referred to as ethical hacking. Though both refer to the same concept, there is a difference between

Read More
Penetration Testing as a Cybersecurity Survival Technique
June 5, 2020 Elearning, Online security admin

It does not matter how strong you made your security controls and policies, if you have tested to see if it can withstand the doom day attack, then you need to think again. You may need to find out if it meets your expectation or other industry standards. Penetration testing can be considered as an

Read More