Baljeet Bilkhu
Professor, Conestoga College
| Title | Type | Subject | Authored on | Last Updated Sort ascending | License | WIP? |
|---|---|---|---|---|---|---|
| Encryption in a NutShell | Drag the Words | Computing & IT | 1 year ago | U | No | |
| Penetration Testing - Maintaining Access… | Drag the Words | Computing & IT | 1 year ago | U | No | |
| Penetration Testing - Exploitation | Drag the Words | Computing & IT | 1 year ago | U | No | |
| Penetration Testing - Scanning | Drag the Words | Computing & IT | 1 year ago | U | No | |
| Penetration Testing - Reconnaissance | Drag the Words | Computing & IT | 1 year ago | U | No | |
| Introduction to Penetration Testing | Drag the Words | Computing & IT | 1 year ago | U | No | |
| Host Based vs Network Based Firewalls | Drag the Words | Technology & Engineering | 1 year ago | U | No | |
| Software Testing Levels | Drag the Words | Computing & IT | 1 year ago | U | No |