Skip to Main Content

PLP Minor in Cybersecurity: LU2_Week 2

Banner

Online Article

Note: Refer to MHE Lecture 2- Introduction to Ethical Hacking Essential: Slide 6

 

Note: Refer to MHE Lecture 2- Introduction to Ethical Hacking Essential: Slide 7

 

ethical hacking process infographic

Note: Refer to MHE Lecture 2- Introduction to Ethical Hacking Essential: Slide 13

 

No alt text provided for this image

Note: Refer to MHE Lecture 2- Introduction to Ethical Hacking Essential: Slide 17 & 30

 

Scope and Limitations of Ethical Hacking

Note: Refer to MHE Lecture 2- Introduction to Ethical Hacking Essential: Slide 26

 

 

how HTTP works

Note: Refer to MHE Lecture 2- Introduction to Ethical Hacking Essential: Slide 29

eBooks

Note: Refer to MHE Lecture 2- Introduction to Ethical Hacking Essential: Slide 13

Note: Refer to MHE Lecture 2- Introduction to Ethical Hacking Essential: Slide 23

Videos

Note: Refer to MHE Lecture 2- Introduction to Ethical Hacking Essential: Slide 5

 

Note: Refer to MHE Lecture 2- Introduction to Ethical Hacking Essential: Slide 23

 

Enumeration Definition, Types, and Techniques - YouTube

Note: Refer to MHE Lecture 2- Introduction to Ethical Hacking Essential: Slide 34

Infographic

Note: Refer to MHE Lecture 2- Introduction to Ethical Hacking Essential: Slide 16

 

Note: Refer to MHE Lecture 2- Introduction to Ethical Hacking Essential: Slide 24