Cybersecurity, DevOps, and DevSecOps
Topics Covered
- SQL Injection
- Cross-Site Scripting
- Command Execution
- Clickjacking
- Cross-Site Request Forgery
- Directory Traversal
- Reflected XSS
- DOM-based XSS
- Downgrade Attacks
- DNS Poisoning
- SSL Stripping
- File Upload Vulnerabilities
- Broken Access Control
- Open Redirects
- Unencrypted Communication
- User Enumeration
- Information Leakage
- Password Mismanagement
- Subdomain Squatting
- AI: Data Extraction Attacks
- AI: Prompt Injection
- AI: Bias and Unreliability
- Privilege Escalation
- Session Fixation
- Weak Session IDs
- XML Bombs
- XML External Entities
- Denial of Service Attacks
- Email Spoofing
- Malvertising
- Lax Security Settings
- Toxic Dependencies
- Logging and Monitoring
- Buffer Overflows
- Server-Side Request Forgery
- Host Header Poisoning
- Insecure Design
- Mass Assignment
- Prototype Pollution
- Regex Injection
- Remote Code Execution
- Cross-Site Script Inclusion
Security Awareness
Courses Library
Beginner Course
- Phishing
- Security at Home
- Using Social Media Safely
- Social Engineering
- Removal Media
- Secure Internet Use
- Working Remotely
- Physical Security
- Cloud Security
- Mobile Device Security
- Public WI-FI
Intermediate Course
- Secure Passwords & Authentication
- What makes a cyber criminal
- Vishing (Voice phishing)
- Information & Data
- The insider Threat
- Patching and Updating
- Smishing (SMS phishing)
- Ransonware
- Videoconferencing securely
- IoT
- Secure Email Use
Advanced Course
- Denial of service of Attacks(DDOS)
- Data Loss
- Home Network security
- Secure VPS use
- Malicious website & Application
- File Sharing in workplace
- Protecting your online security
- Spyware & Adware
- Clear Desk Policy
- The Dark Webb