Uploaded by hamodah-ma

Ben

advertisement
Introduction about risk analysis and risk management in companies by using assets and threats and how to manage these risks and classify them from high to low according to their probabilities and their effects on the company using certain methadologies according to ISO standards and norms. Second Workshop: Talks about pentesting using kali linux operating system on how to do ethical hacking using IP addresses and exploits and how to get access and check the vulernability using exploits of certain programs also web server exploits on how to get access to web servers using kali linux and metasploitable2 with the help of the virtual box using DVWA web app to know and explore its vulnerabilities and how to do interactive sessions using net cad between an attacker device with a web server to access its contents in a low security level web server.
Pentesting Steps :
1-Search for exploits 2- USE
3-Show Options
4-Show payloads and run In the raspberry session we were given raspberry electronics and try to use python programming language to code RGB light and use GUI and Remote to control the light of the RGB color. Dockers are basically containers and has more benefits in using more than using the virtual machines and it allows thr user to get an image from the container and use it we are currently trying the commands and the installation of the docker and we are figuring how it works and apply certain operations on containers like volumes and networks etc.
Saas is a project management technology using agile methodology in order to develop or create a product using this methodology by iterations ( sprints) over a period of time max 4 weeks
Download