SearchSkip to Search Results
- 2penetration testing
- 1ISO/IEC 27002 compliance
- 1Kali Linux
- 1Metasploitable 2
A comprehensive framework for a risk and role based enterprise security awareness, training and education program for ISO/IEC 27002 complianceDownload
Organizations are faced with a variety of ever changing information security risks. This study examines the state of information security, user groups and user roles responsible for and ISO/IEC domains required for risk mitigation in a large public organization in Canada. The objective is to...
This unit focuses on penetration testing, and the main objective is to perform penetration testing on Metasploitable 3 to exploit vulnerabilities and to escalate privileges to administrator rights or higher. The primary purpose of this unit is to exploit Metasploitable 3 by taking reference from...
Penetration testing is a comprehensive process of protection and monitoring where a tester simulates an attack to find security vulnerabilities that an attacker can exploit on a secured network. It helps decide the best way to prevent and secure sensitive data from potential cybersecurity...
Containers technology has radically changed the ways for packaging applications and deploying them as services in a cloud environment. According to the recent report of TrendMicro security predictions of 2020, the vulnerabilities in container components that are deployed with cloud architecture...