YoVDO

Introduction to Security and Network Forensics - Threat Analysis - Lecture 8

Offered By: Bill Buchanan OBE via YouTube

Tags

Network Forensics Courses Penetration Testing Courses SQL Injection Courses Surveillance Courses Phishing Courses Password Security Courses Vulnerability Analysis Courses

Course Description

Overview

Explore Chapter 8 of "Introduction to Security and Network Forensics" by Prof Bill Buchanan in this comprehensive lecture. Delve into crucial topics such as penetration testing, surveillance, vulnerability analysis, and influence analysis. Witness practical demonstrations of vulnerability analysis, influence analysis, and SQL injection. Learn about fishing techniques and password security. Gain insights into various vulnerability tests and their importance in network security. For more in-depth information, visit the accompanying website at asecuritybook.com/unit08.html. Note that this video is a corrected version with proper audio sync, replacing the original upload.

Syllabus

Introduction
Penetration Testing
Surveillance
Vulnerability Analysis
Vulnerability Analysis Demo
Influence Analysis Demo
SQL Injection Demo
Fishing
Passwords
Vulnerability Tests


Taught by

Bill Buchanan OBE

Related Courses

Information security - IV
Indian Institute of Technology Madras via Swayam
Hacking Laboratuvarınızı Oluşturun
Udemy
Digital Forensics
Uttarakhand Open University, Haldwani via Swayam
Digital Forensics Concepts
Infosec via Coursera
Enumerating the Network Infrastructure as a Forensics Analyst
Pluralsight