This course introduces the attendees with a wealth of hacking tools and techniques which are crucial in order to get started in the dynamic field of cyber security.
Who Should Attend
Individuals interested in learning Cyber Security & Investigation from scratch or an experienced professional who would like to enhance your existing skills to be a digital literate to respond to an incident, or for fun, this training will help you accomplish your goals!
Certification Information
Participate in our online Capture the Flag lab and solve the challenges to earn certificate.
Course Curriculum
Instruction | |||
General Instruction | 00:00:00 | ||
Module 1 - Kali Linux Installation | |||
Kali Linux Installation | 00:14:19 | ||
Module 2 - Breaking Windows Passwords | |||
Breaking Windows Passwords | 00:08:05 | ||
Module 3 - Breaking Linux Passwords | |||
Breaking Linux passwords | 00:07:48 | ||
Module 4 - Hacking Social Media Accounts | |||
Hacking Social Media Accounts | 00:17:03 | ||
Module 5 - Android Hacking | |||
Android Hacking | 00:11:13 | ||
Module 6 - Attacking WiFi Networks | |||
Attacking WiFi Networks | 00:05:42 | ||
Module 7 - Safeguarding WiFi Networks | |||
Safeguarding WiFi Networks | 00:07:28 | ||
Module 8 - Building Virus & Malware | |||
Building Virus & Malware | 00:09:01 | ||
Module 9 - Website Hacking | |||
Website Hacking | 00:04:53 | ||
Module 10 - Cracking Passwords | |||
Cracking Passwords | 00:04:45 | ||
Module 11 - Bluetooth Hacking | |||
Bluetooth Hacking | 00:04:08 | ||
Module 12 - Google Dorks | |||
Google Dorks | 00:03:24 | ||
Module 13 - Email Authenticity | |||
Email Authenticity | 00:04:10 | ||
Module 14 - Command Prompt | |||
Command Prompt | 00:08:18 | ||
Module 15 - Social Engineering Toolkit | |||
Social Engineering Toolkit | 00:10:42 | ||
Module 16 - Anonymous | |||
Anonymous | 00:13:04 | ||
Examination | |||
Examination | 00:00:00 |
Course Reviews
3 STUDENTS ENROLLED
Nice Course
nice