Skip to main content
Side panel
Home
More
Search
Close
Search
Toggle search input
English (en)
English (en)
Slovenščina (sl)
Македонски (mk)
Русский (ru)
한국어 (ko)
You are currently using guest access
Log in
Home
Expand all
Collapse all
Open course index
Open block drawer
ipri3
28.10.@16:30 -> PENetration TESTing, and Breach databases
28.10.@16:30 -> PENetration TESTing, and Breach databases
Section outline
Select activity Penetration Testing process and Breach databases [slides]
Penetration Testing process and Breach databases [slides]
File
PDF
6.0 MB
Select activity ipri3-6138-LECT2and3
ipri3-6138-LECT2and3
BigBlueButton
Select activity EU Data Protection Directive
EU Data Protection Directive
URL
Select activity SI-CERT resource on SI laws on cybercrime (In SLO)
SI-CERT resource on SI laws on cybercrime (In SLO)
URL
Select activity A sample penetration testing report (by offensive security)
A sample penetration testing report (by offensive security)
File
Uploaded 12/10/20, 09:06
Select activity Nasu, H. (2015). STATE SECRETS LAW AND NATIONAL SECURITY
Nasu, H. (2015). STATE SECRETS LAW AND NATIONAL SECURITY
File
Uploaded 12/10/20, 09:06
Select activity Ars Technica article on a huge passwords leak
Ars Technica article on a huge passwords leak
URL
Select activity nmap cheat sheet
nmap cheat sheet
URL
Select activity haveibeenpwned?
haveibeenpwned?
URL
Select activity Homework 2 (Submit by Monday 2.11.2020@12:00)
Homework 2 (Submit by Monday 2.11.2020@12:00)
Assignment