Skills Cloud Security Architecture and Engineering Technology and Application Security Architecture Secure DevOps (DevSecOps) Containers (Docker) and Microservices Automation of Security Controls / Analysis Agile, Git, CI/CD Pipelines and IaC Serverless Development and Architecture Threat Modelling and Risk Management Development: C++/QT5, NodeJS, AWS Lambda Security Assessments, Malware Analysis...
Stats
Alexa Rank:
Popular in Country:
Country Alexa Rank:
language: en
Response Time: 0.68944
SSL: Enable
Status: up
Code To Txt Ratio
Word Count 258
Links
ratio 36.108676599474
SSL Details
SSL Issuer:
Issuer: Sectigo RSA Domain Validation Secure Server CA
Valid From: 2022-01-07 00:00:00
Expiration Date: 2023-02-07 23:59:59
SSL Organization:
Signature 93e2fd26166ff8bdf8ef7920b050fc1ac8c91894
Algorithm: RSA-SHA256
DVWA - Damn Vulnerable Web Application
Damn Vulnerable Web App (DVWA) is a PHP/MySQL web application that is damn vulnerable. Its main goals are to be an aid for security professionals to test their skills and tools in a legal environment, help web developers better understand the processes of securing web applications and aid teachers/students to teach/learn web application security in a class room environment.
PentesterLab: Learn Web Penetration Testing: The Right Way
WHAT OUR PRO MEMBERS SAY: 10010101 10110110 1010 “I consider PentesterLab to be a great resource for learning about web application security and ways how it can be subverted. Even though the exercises usually don’t take much time to complete they can teach a lot. I can’t but recommend it,...
bWAPP, a buggy web application!
Home bWAPP, or a buggy web application, is a free and open source deliberately insecure web application. It helps security enthusiasts, developers and students to discover and to prevent web vulnerabilities. bWAPP prepares one to conduct successful penetration testing and ethical hacking projects. What makes bWAPP so unique? Well, it...
Vulnerable By Design ~ VulnHub
VulnHub provides materials allowing anyone to gain practical hands-on experience with digital security, computer applications and network administration tasks.
Google Cloud Platform
Email or phone Forgot email? Not your computer? Use a private browsing window to sign in. Learn more Next Create account
Acunetix Web Vulnerability Scanner - Test websites
SecurityTweets http://testhtml5.vulnweb.com nginx, Python, Flask, CouchDB Review Acunetix HTML5 scanner or learn more on the topic. Acuart http://testphp.vulnweb.com Apache, PHP, MySQL Review Acunetix PHP scanner or learn more on the topic. Acuforum http://testasp.vulnweb.com IIS, ASP, Microsoft SQL Server Review Acunetix SQL scanner or learn more on the topic. Acublog http://testaspnet.vulnweb.com...
WordPress.com: Fast, Secure Managed WordPress Hosting
Create a free website or build a blog with ease on WordPress.com. Dozens of free, customizable, mobile-ready designs and themes. Free hosting and support.
w4rri0r - Hacking Is Not A Crime - It's an art of Awareness
Cloud Security Mobile Security Wireless Security Network Security Tab 1 Cloud Security Cloud Security is the set of security protocols, methodologies and technologies that protect the availability of cloud resources and the integrity of data stored in a cloud computing environment. Cloud security differs from traditional computer security in that...
Offensive Sec Blog
Wednesday, February 9, 2022 ECDX - Exploit Development Student OffensiveSec 4:28:00 PM Elearn Security No comments ECDX - Exploit Development Student from the popular eLearnSecurity Institute and INE is an Exploit Development training at the beginner level. Prerequisites for this course Completion of the eJPT courseIs. The eCXD...
DST - Development Standards Technologies
DST is registered in Nigeria and we produce and market software products, develop and host websites, and provide a wide range of consulting services.