Beruflich Dokumente
Kultur Dokumente
What is Cryptography
Types of cryptography
Cipher algorithms
What is a Hash
Cryptography attacks
VPN Technologies
Sniffers
Types of sniffing
o Active sniffing
o Passive Sniffing
MAC Attacks
DHCP Attacks
MAC spoofing
Counter measures
Denial of Service
What is a Botnet
SQL Injection
Phishing
What is Phishing
Penetration Testing
What is to be tested