The Foundation Course Edition brings to you more new, neat and ridiculous hacking scenario. From old school issues to the very latest current trending techniques and exploits against the modern digital world, we have got it all covered! This course will cover techniques to achieve cyber literacy against these attacks.
Who Should Attend
This course is perfect for beginners interested in learning concepts of Cyber Security, but have no prior knowledge.
Note: Please wait for 24hrs-48hrs for admins approval to view the course after purchase.
Course Curriculum
Instructions | |||
General Instructions | 00:00:00 | ||
Module 1 - Introduction to Hacking | |||
Introduction to Hacking | 00:03:19 | ||
Module 2 - Fundamentals of Hacking | |||
Fundamentals of Hacking | 00:08:37 | ||
Module 3 - Phishing | |||
Phishing | 00:02:13 | ||
Module 4 - Keylogger | |||
Keylogger | 00:01:50 | ||
Module 5 - Intoduction to Malicious Attacks | |||
Introduction to Malicious Attacks | 00:04:50 | ||
Module 6 - Line of Defense | |||
Line of Defense | 00:04:04 | ||
Module 7 - Introduction to WiFi Hacking | |||
Introduction to WiFi Hacking | 00:02:00 | ||
Module 8 - Anonymous | |||
Anonymous | 00:13:04 | ||
Module 9 - Deep web and Dark net | |||
Deep web and Dark net | 00:09:09 | ||
Module 10 - Ransomware | |||
Ransomware | 00:04:37 | ||
Module 11 - Browser Hacking | |||
Browser Hacking | 00:01:06 | ||
Module 12 - Introduction to IoT Hacking | |||
Introduction to IoT Hacking | 00:02:31 | ||
Module 13 - Encryption and Decryption | |||
Encryption and Decryption | 00:04:59 | ||
Module 14 - Security Status Verification Techniques | |||
Security Status Verification Techniques | 00:02:48 | ||
Module 15 - Security Measures | |||
Security Measures | 00:02:32 |
Course Reviews
117 STUDENTS ENROLLED
Nice Course
The course gives a good beginners knowledge about cyber security.