Nicholas HandyPenetration Testing Introduction: Scanning & ReconnaissanceTools and methods of penetration testingAug 15, 2018Aug 15, 2018
Nicholas HandyBug Reporting for Bug BountiesWait, I know you are excited that you just found a bug. Don’t gloss over one of the most important steps in the bug bounty process — the…Aug 8, 2018Aug 8, 2018
Nicholas HandyKali Linux & Metasploit: Getting Started with Pen TestingIn this blog we will take a look at two of the most popular tools in penetration testing — Kali Linux & The Metasploit Framework.Aug 2, 20181Aug 2, 20181
Nicholas HandyBurp Suite: Webpage Enumeration and Vulnerability TestingWhere to start with a whole domain at your fingertips?Jul 31, 20181Jul 31, 20181
Nicholas HandyCreating a Cyber Security Environment for BeginnersWhat goes into creating a security learning space for beginners?Jul 31, 2018Jul 31, 2018
Nicholas HandyPrepping Students for the Cyber Defenders HackathonWe are excited to bring the first Cyber Defenders Hackathon to Community College students of the Bay Area. The Cyber Defenders Program…Feb 24, 2018Feb 24, 2018