Uploaded by hamodah-ma

sodapdf-converted

advertisement
Introduction about risk analysis and risk management in companies by using assets and threats and how
to manage these risks and classify them from high to low according to their probabilities and their effects
on the company using certain methadologies according to ISO standards and norms.
Second Workshop: Talks about pentesting using kali linux operating system on how to do ethical hacking
using IP addresses and exploits and how to get access and check the vulernability using exploits of
certain programs also web server exploits on how to get access to web servers using kali linux and
metasploitable2 with the help of the virtual box using DVWA web app to know and explore its
vulnerabilities and how to do interactive sessions using net cad between an attacker device with a web
server to access its contents in a low security level web server.
Pentesting Steps :
1-Search for exploits
2- USE
3-Show Options
4-Show payloads and run
In the raspberry session we were given raspberry electronics and try to use python programming
language to code RGB light and use GUI and Remote to control the light of the RGB color.
Dockers are basically containers and has more benefits in using more than using the virtual machines
and it allows thr user to get an image from the container and use it we are currently trying the commands
and the installation of the docker and we are figuring how it works and apply certain operations on
containers like volumes and networks etc.
Saas is a project management technology using agile methodology in order to develop or create a
product using this methodology by iterations ( sprints) over a period of time max 4 weeks
Download