Requirements
Be able to contact me
Description
- what we learn
- Kali Linux
- parrot os
- cyber threats
- basics of cybersecurity
- basics of cryptography
- History of Ethical Hacking
- Penetration Testing
- Footprinting
- using DNS to get more information
- TCP/IP
- Wireshark
- DHCP
- Types of cryptography
- Cryptography Hashing
- TLS & SSL
- Disk encryption
- IDS Evasion
- Scanning
- Fundamentals Of Networking
- launch Kali Linux on WINDOWS Using VMware
- launch Kali Linux on MAC Using Virtual Box
- Installing Kali Tools On Linux Distribution
- Parrot OS detail
- Parrot Operating System
- Kali Linux v/s Parrot OS
- Penetration Testing
- Nmap
- Cross-site Scripting
- DDOS Attack
- SQL Injection
- SQL Injection Attack
- Stegnography
- LSB Stegnography
- Ethical Hacking Roadmap
- Interview questions
Who this course is for:
- computer science
- ethical hacker
- beginner to pro-level ethical hacking
ENROLL
0 comments:
Post a Comment