Waa Koorso aad u qiimo badan oo ku saabsan Cyber Security ga, waxaad ku baranaysaa cilmiyo badan oo la xidhiidha Cyber Security ga. Waxaa ku jira Barashada Linux ka, Wireless ka, Jabinta Wireless ka iyo Webistes ka. Waxaad kaloo baranaysaa Tools badan oo ay leedahay Linux.
Waxaa baran kara qof walba oo fahansan qaabka Networking ku u shaqeeyo iyo qof adeegsan kara Computer ka isku na dayi kara inuu xalliyo caqabadaha ka hor yimaadda.
Course Features
- Lectures 61
- Quizzes 0
- Duration Lifetime access
- Skill level All levels
- Language English
- Students 35
- Assessments Yes
Curriculum
- 10 Sections
- 61 Lessons
- Lifetime
- Introduction6
- Installation9
- 2.1Lesson 5B: Installing VMachine
- 2.2Lesson 6: Downloading Kali Linux
- 2.3Lesson 7: Installing Kali Linux
- 2.4Lesson 8: Downloading Metasploitable 2
- 2.5Lesson 9: Downloading OWASP
- 2.6Lesson 9A: Installing OWASP
- 2.7Lesson 10: Installing Metasploitable 2
- 2.8Lesson 11: Pen Testing
- 2.9Lesson 12: Connecting The Server
- Understanding Wireless4
- Linux Basics2
- Cyber Security Attacks2
- Wireless Hacking TOOLS5
- Wireless Hacking Practical11
- 7.1Lesson 25: WEP Protocol
- 7.2Lesson 26: WEP Cracking
- 7.3Lesson 27: Fake Authentication Attack
- 7.4Lesson 28: Fake Authentication 2
- 7.5Lesson 29: ARP Request Replay Attack
- 7.6Lesson 30: What is WPA?
- 7.7Lesson 31: 4 Way Handshake
- 7.8Lesson 32: WPA HACKING PROCESS
- 7.9Lesson 33: Hacking WPA2
- 7.10Lesson 34: AirCrack-ng
- 7.11Lesson 35: Crunch TOOL
- Scanning Website Vulnerabilities3
- Web Technology6
- Website Hacking13
- 10.1Lesson 45: Metasploitable to Kali Linux
- 10.2Lesson 46: Running Metasploitable 2
- 10.3Lesson 47: Applying Brute Force Attack
- 10.4Lesson 48: XSS Attack 1
- 10.5Lesson 49: Stored XSS Attack
- 10.6Lesson 50: XSS Attack Prevention
- 10.7Lesson 51: View Source Code
- 10.8Lesson 52: Extending Field Characters
- 10.9Lesson 53: Upload Attacks
- 10.10Lesson 54: Weevely and BurpSuite
- 10.11Lesson
- 10.12Lesson 56: Applying SQL Injection 1
- 10.13Lesson 57: SQL Injection 2