Course Curriculum
| (W26M1) Reconnaissance and information gathering | 00:00:00 | ||
| (W26M2) Network Scanning: The Basics | 00:00:00 | ||
| (W26M3) Exploitation | 00:00:00 | ||
| (W26M4) Postexploitation | 00:00:00 | ||
| (W26M5) Basics of SQL Injection for different databases | 00:00:00 | ||
| (W26M6) The Concept of Vulnerability Type SQLi | 00:00:00 | ||
| (W26M7) Cross-site Scripting | 00:00:00 |



