Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
Articles 1 - 1 of 1
Full-Text Articles in Physical Sciences and Mathematics
Ethical Hacking For Effective Defense (Modules, Labs, And Lectures), Hossain Shahriar
Ethical Hacking For Effective Defense (Modules, Labs, And Lectures), Hossain Shahriar
Computer Science and Information Technology Ancillary Materials
Summer 2019 Update: Through a Round Twelve ALG Mini-Grant for Ancillary Materials Creation and Revision, five new modules have been added to this collection:
- Enumeration with Sparta
- Enumeration with Inguma
- Hacking Web Servers with Dirbuster
- Hacking Web Servers with Skipfish
- Hacking Wireless and IoT with Bluehydra
The following set of materials is used in the Textbook Transformation Grants implementation of Ethical Hacking for Effective Defense:
https://oer.galileo.usg.edu/compsci-collections/8/
Topics include:
- TCP/IP Level Attacks
- Port Scanning
- DDoS
- Footprinting and Social Engineering
- Enumeration
- Programming for Security Professionals
- Operating System Vulnerabilities
- Embedded System Security
- Hacking Web Servers
- Hacking Wireless Networks
- Cryptography
- Protecting Networks with …