- 1/30/2013 - Complete the Programming section of: Hacking: The Art of Exploitation
- 2/6/2013 - Complete the Exploitation section of: Hacking: The Art of Exploitation
- 2/13/2013 - Complete the Networking section of: Hacking: The Art of Exploitation
- 2/20/2013 - Complete the Shellcode section of: Hacking: The Art of Exploitation
- 2/27/2013 - Complete the Countermeasures section of: Hacking: The Art of Exploitation
- 3/6/2013 - Complete the Cryptology section of: Hacking: The Art of Exploitation
- 3/13/2013 - Complete the Cross-Site Scripting course of Google's Web Application Exploits and Defenses
- 3/20/2013 - Complete the Client-State Manipulation and Cross-Site Request Forgery courses of Google's Web Application Exploits and Defenses
- 3/27/2013 - Complete the Cross-Site Script Inclusion and Path Traversal courses of Google's Web Application Exploits and Defenses
- 4/3/2013 - Complete the Denial of Service and Code Execution courses of Google's Web Application Exploits and Defenses
- 4/10/2013 - Complete the Configuration Vulnerabilities course of Google's Web Application Exploits and Defenses
- 4/17/2013 - Complete the AJAX Vulnerabilities and Other Vulnerabilities courses of Google's Web Application Exploits and Defenses
- 4/23/2013 - Create some demo videos of some of the concepts learned throughout the semester
Tuesday, January 22, 2013
Tentative Schedule
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment