Our project focuses on ethical hacking and defending in the form of a red/blue team. Our project was broken into 3 phases. In Phase one we were given a server stack and told to do what we could in order to analyze weak points. In phase 2 we were told to bolster the defenses of those weak points. Lastly, in phase 3 were we given an IP address of an opposing team to attack while defending against another teams advances
Computer networks are built to achieve the main goal of communicating with each other . During the t...
Web applications allow users to receive and communicate content from remote servers through web brow...
Context: Code hardening is meant to fight malicious tampering with sensitive code executed on client...
This project is to showcase a real life scenario of securing a theoretical business website on Red H...
The team was assigned the responsibility of securing a web server. This business website is hosted o...
For the Cybersecurity capstone project, our team was given a webserver and website for the company A...
Our team engaged in a mock cybersecurity drill. Our objective was to take on the roll of cybersecuri...
The project focuses on securing the server infrastructure of Akwaaba, a Caribbean-inspired steakhous...
Testing security systems is challenging because a system\u27s authors have to play the double role o...
The purpose of this capstone was to form a cyber security team to help a small business, a restauran...
The Internet has witnessed a tremendous growth the last years. Undoubtedly, its services and mostly ...
Code protections aim at blocking (or at least delaying) reverse engineering and tampering attacks to...
Code protections aim at blocking (or at least delaying) reverse engineering and tampering attacks t...
With a growing number of users getting connected to the Internet and given their growing reliance on...
The state of security on the internet is very poor. Hacking is an activity in which, a person explo...
Computer networks are built to achieve the main goal of communicating with each other . During the t...
Web applications allow users to receive and communicate content from remote servers through web brow...
Context: Code hardening is meant to fight malicious tampering with sensitive code executed on client...
This project is to showcase a real life scenario of securing a theoretical business website on Red H...
The team was assigned the responsibility of securing a web server. This business website is hosted o...
For the Cybersecurity capstone project, our team was given a webserver and website for the company A...
Our team engaged in a mock cybersecurity drill. Our objective was to take on the roll of cybersecuri...
The project focuses on securing the server infrastructure of Akwaaba, a Caribbean-inspired steakhous...
Testing security systems is challenging because a system\u27s authors have to play the double role o...
The purpose of this capstone was to form a cyber security team to help a small business, a restauran...
The Internet has witnessed a tremendous growth the last years. Undoubtedly, its services and mostly ...
Code protections aim at blocking (or at least delaying) reverse engineering and tampering attacks to...
Code protections aim at blocking (or at least delaying) reverse engineering and tampering attacks t...
With a growing number of users getting connected to the Internet and given their growing reliance on...
The state of security on the internet is very poor. Hacking is an activity in which, a person explo...
Computer networks are built to achieve the main goal of communicating with each other . During the t...
Web applications allow users to receive and communicate content from remote servers through web brow...
Context: Code hardening is meant to fight malicious tampering with sensitive code executed on client...