Search for tag: "vulnerabilities"

MSSE600 Week 3 Lecture

* Describe why requirements gathering is important* List the characteristics of good requirements* Define the MOSCOW method for prioritizing requirements* List the different kinds of requirements *…

From  Scott Vandenelzen 59 plays 0  

Website Vulnerabilities

In this video we will use recon-ng and PunkSpider within Kali and Windows to scan for XSS, SQLi, BSQLi, XPath, MXI and other vulnerabilities within websites.

From  mgoodwyn@regis.edu 17 plays 0  

A Discussion On: MSBA, GFI LanGuard, WSUS & Common Vulnerabilities and Exposures (CVE)

In our discussion today we will continue with the deployment and hardening of a new node on our network. To that end, one very useful hardening technique is patch management, and a useful tool…

From  mgoodwyn@regis.edu 21 plays 0