Resources

Virtual Machines

Cheat Sheets

Linux:

Lecture Slides

# Topic
1 Welcome & Introduction
2 Networking Recap of COMP 177
3 Penetration Testing: Overview
4 Penetration Testing: Reconnaissance
5 Penetration Testing: Scanning
6 Penetration Testing: Vulnerability Scanning
7 Penetration Testing: Exploitation
8 Penetration Testing: Post-Exploitation

Cryptography