Posted on
in Presentations
This course will walk you through different exercises related to hacking various web applications. With the use tools like Burpsuite, Zap and others, the session will take you from conception to active control. You will also receive materials and additional exercises that you can complete in your own. You can take advantage of VMs and Docker containers that were created to practice your skills.
Cloud Security Hackers & Threats
application security cloud security data security exploit of vulnerability web security
Topic
Cloud Security
Hackers & Threats
Subtopic
application security
cloud security
data security
exploit of vulnerability
web security
Share With Your Community