February 22, 2022
Part 1 - Introduction to security testing, basic authentication process, password rules
Part 2 - Malicious files, SQL Injection, JS Injection, Cross Site Scripting
Part 3 - Firewalls, Penetration testing, Encryption of data
Part 4 - Roled based access, Add Modify Delete View rights on data
Part 5 - Trojan injection, Phishing