Found 86 presentations matching your search
The OWASP Zed Attack Proxy (ZAP) is a widely used open-source web application security testing tool....
Penetration testing relies on various tools to identify vulnerabilities and security weaknesses with...
comprehensive platform for conducting security assessments, penetration testing, and ethical hacking...
11th International Conference on Software Security (ICSS 2025) is traditionally, security in softwar...
Forensics - Cyber Security
This presentation is about Red Team vs Blue Team in the world of Cyber Security and how they would p...
Penetration Testing using open sourse technology
Description: This presentation offers a deep dive into SQL Injection (SQLi) and Cross-Site Request F...
Hacking
Vulnerability Assessment and Penetration testing
Regular security audits, staying updated with security patches, and integrating security into the de...
Ghh
web application attacks techniques for pen-testing
Analisa dan test penetrasi keamanan teknologi informasi
Pentesting Advice Penetration testing (pentesting) is a critical component of cybersecurity, aimed a...
sw
about security
Explore common web application vulnerabilities like CSRF and XSS, and learn how ethical hackers use ...
This presentation explores the essential technique of port scanning, a crucial step in website secur...
Embark on a journey into the clandestine world of cyber reconnaissance with our cyber security proje...
Computer security slide for chapter 2 for catholic comprehensive community college IT students by Th...