Search
Skip to Search Results- 4vulnerabilities
- 2Metasploit
- 2penetration testing
- 1ISO/IEC 27002 compliance
- 1Kali Linux
- 1Metasploitable 2
-
2020
This unit focuses on penetration testing, and the main objective is to perform penetration testing on Metasploitable 3 to exploit vulnerabilities and to escalate privileges to administrator rights or higher. The primary purpose of this unit is to exploit Metasploitable 3 by taking reference from...
-
2020
Containers technology has radically changed the ways for packaging applications and deploying them as services in a cloud environment. According to the recent report of TrendMicro security predictions of 2020, the vulnerabilities in container components that are deployed with cloud architecture...
-
A comprehensive framework for a risk and role based enterprise security awareness, training and education program for ISO/IEC 27002 compliance
Download2011-01-01
Organizations are faced with a variety of ever changing information security risks. This study examines the state of information security, user groups and user roles responsible for and ISO/IEC domains required for risk mitigation in a large public organization in Canada. The objective is to...