|
25 | 25 | * [Introduction to Reconnaissance](./Module%2002%20-%20Reconnaissance/lectures/lecture_1_introduction.md) |
26 | 26 | * [Information Gathering](./Module%2002%20-%20Reconnaissance/lectures/lecture_2_information_gathering.md) |
27 | 27 | * [Open Source Intelligence (OSINT)](./Module%2002%20-%20Reconnaissance/lectures/lecture_3_OSINT.md) |
28 | | - * [Social Engineering](./Module%2002%20-%20Reconnaissance/lectures/lecture_4_social_engineering.md) |
| 28 | + * [Social Engineering in Reconnaissance](./Module%2002%20-%20Reconnaissance/lectures/lecture_4_social_engineering.md) |
29 | 29 | * [Search Engines for Reconnaissance](./Module%2002%20-%20Reconnaissance/lectures/lecture_5_search_engines.md) |
30 | 30 |
|
31 | 31 | ### Module 03 - Penetration Testing |
|
36 | 36 |
|
37 | 37 | * [Introduction](./Module%2004%20-%20Web%20Security/introduction.md) |
38 | 38 | * Lectures |
39 | | - * [Introduction to Web](./Module%2004%20-%20Web%20Security/lectures/lecture_1_introduction.md) |
40 | | - * [Security Features of the Browser](./Module%2004%20-%20Web%20Security/lectures/lecture_2_security_features.md) |
41 | | - * [Client Side Vulnerabilities](./Module%2004%20-%20Web%20Security/lectures/lecture_3_client_side.md) |
| 39 | + * [Introduction to Web Security](./Module%2004%20-%20Web%20Security/lectures/lecture_1_introduction.md) |
| 40 | + * [Browser Security Features](./Module%2004%20-%20Web%20Security/lectures/lecture_2_security_features.md) |
| 41 | + * [Client-Side Vulnerabilities](./Module%2004%20-%20Web%20Security/lectures/lecture_3_client_side.md) |
42 | 42 | * [Server Side Vulnerabilities](./Module%2004%20-%20Web%20Security/lectures/lecture_4_server_side.md) |
| 43 | + * [API Security](./Module%2004%20-%20Web%20Security/lectures/lecture_5_api_security.md) |
43 | 44 |
|
44 | 45 | ### Module 05 - Hacking with Python |
45 | 46 |
|
|
112 | 113 | * [Overview of Cloud Security](./Module%2017%20-%20Cloud%20Security/lectures/lecture_1_overview.md) |
113 | 114 | * [Comparison of Server Types: Cloud, Dedicated, and Shared Servers](./Module%2017%20-%20Cloud%20Security/lectures/lecture_2_pros_cons.md) |
114 | 115 | * [User and Permission Management in Cloud Platforms](./Module%2017%20-%20Cloud%20Security/lectures/lecture_3_authentication.md) |
115 | | - * [Containerization Overview:](./Module%2017%20-%20Cloud%20Security/lectures/lecture_4_containerization.md) |
116 | | - * [Cloud Computing Security Concepts:](./Module%2017%20-%20Cloud%20Security/lectures/lecture_5_security_concepts.md) |
| 116 | + * [Containerization Overview](./Module%2017%20-%20Cloud%20Security/lectures/lecture_4_containerization.md) |
| 117 | + * [Cloud Computing Security Concepts](./Module%2017%20-%20Cloud%20Security/lectures/lecture_5_security_concepts.md) |
117 | 118 | * [Secure DevOps in the Cloud](./Module%2017%20-%20Cloud%20Security/lectures/lecture_6_secure_devops.md) |
118 | 119 | * [Exploring Key Certifications and Standards in On-Premises and Cloud Security](./Module%2017%20-%20Cloud%20Security/lectures/lecture_7_certification.md) |
119 | 120 |
|
|
0 commit comments