penetration testing

API Security | Applications

Complete Guide on API Security for Mobile Apps | Creative Ground Tech     What is API security? The world has transitioned to an era of interconnectivity with the Internet of Things (IoT) taking over all phases of everyday human life. And, API is the most common thread that connects all devices and microservices. With …

API Security | Applications Read More »

cgt

C2: Command and Control Explained

A successful cyberattack is about more than just getting your foot into the door of an unsuspecting target. To be of any real benefit, the attacker needs to maintain persistence access within the target environment, communicate with infected or compromised devices inside the network, and potentially exfiltrate sensitive data. The key to accomplishing all these …

C2: Command and Control Explained Read More »

Nmap Cheat Sheet

Nmap Cheat Sheet

  Here are simple nmap commands that will make your penetration testing easier. Nmap is a free and open-source network scanner. Nmap is used to discover hosts and services on a computer network by sending packets and analyzing the responses. Nmap provides a number of features for probing Computer Networks, including Host Discovery and Services …

Nmap Cheat Sheet Read More »

What is Cross-site Request Forgery (CSRF)?

What is Cross-site Request Forgery (CSRF)?

What is Cross-Site Request Forgery (CSRF)? Cross-site Request Forgery, also known as CSRF is an attack whereby an attacker tricks an end user to execute unwanted actions on a web application in which they’re currently authenticated. The impact of the attack depends on the level of permissions that the victim has on the application. Such …

What is Cross-site Request Forgery (CSRF)? Read More »

error: Content is protected !!

Our training courses are designed to help businesses develop the workforce with the vital skills any organization requires.

The #1 cyber security and data science training provider in Africa.

Our Courses

Newsletter

Sign up to our newsletter